Skip to main content

8.6 Prometheus

Prometheus is a time-series database and monitoring system that collects, stores, and queries metrics from various sources like our previously set up Node Exporter, JSON Exporter, and Blackbox Exporter. The guide explains how to set up the local Prometheus server and it's configuration to gather and unify all those metrics.

tip

Further details about node analytics can be found on the Monitoring Tools page in the ๐Ÿง  Theory section.

info

The following steps are performed on your ๐Ÿ“Ÿ node server.

1. Create System Userโ€‹

Running services as a system user with minimal privileges is a best practice, limiting damage if compromised. The Blackbox Exporter user will only be able to read and execute service-specific files. Use the system's user creation tool to add a new one.

sudo adduser --system prometheus-worker --group --no-create-home
Full Command Explanation
FlagDescription
--system Creates a system user, used to run services and daemons rather than for people to log in with.
--group Creates a new group with the same name as the user.
--no-create-home Prevents creation of a home directory since the service does not need one.

If you want to confirm that the user has been created, you can search for it within the password file, housing all essential information for each user account. Using the search tool grep, we can check if the user exists within the file.

grep "prometheus-worker" /etc/passwd

The output should look similar to this:

prometheus-worker:x:117:123::/home/prometheus-worker:/usr/sbin/nologin

2. Install Prometeusโ€‹

To add the Prometheus tool to your node, you have to install it's package.

tip

Depending on the Current Prometheus Release the version and filenames might differ. Please ensure to use the latest LTS Release for best security and stability. As of July 2025 it is version 2.53.5. A full list of versions and categorized releases can be viewed on the official Prometheus Download Page.

2.1 Download Archive: Move to the home directory and download the latest version.

cd
wget https://github.com/prometheus/prometheus/releases/download/v2.53.5/prometheus-2.53.5.linux-amd64.tar.gz

2.2 Extract Files: Unpack the archive using Ubuntuโ€™s archiving tool.

tar xzfv prometheus-2.53.5.linux-amd64.tar.gz
info

The tar command extracts x the uncompressed z archive from the file path f using verbose v status messages.

2.3 Navigate into the Folder: Move into the extracted archive to view the executables.

cd prometheus-2.53.5.linux-amd64
ls -al
cd
info

You will see Promtool and Prometheus showing up as executable programs that will both have to be installed.

ToolDescription
prometheusThe main Prometheus server that scrapes and stores metrics, and exposes it's database for querying.
promtoolThe utility tool used for validating, and debugging Prometheus configuration files and alerting rules.

2.4 Move Binary to System Path: Move the Promtool and Prometheus binaries to your system path.

sudo cp prometheus /usr/local/bin/
sudo cp promtool /usr/local/bin/

2.5 Set Ownership and Permissions: Set the correct owner and access rights.

sudo chown -R prometheus-worker:prometheus-worker /usr/local/bin/prometheus
sudo chown -R prometheus-worker:prometheus-worker /usr/local/bin/promtool
sudo chmod 755 /usr/local/bin/prometheus
sudo chmod 755 /usr/local/bin/promtool
Full Command Descriptions
SettingDescription
sudo chown <user>:<user> <directory> Assign ownership to a single folder or file.
sudo chmod 755 <directory> Set readable permissions for everyone, typically for general files.

2.6 Cleanup Installation Files: Delete leftover archive and extracted folder.

rm -rf prometheus-2.53.5.linux-amd64
rm prometheus-2.53.5.linux-amd64.tar.gz

3. Dataset Configurationโ€‹

After the executables have been set up, you must create a separate configuration file for the Prometheus server to collect all of the exporter's information, and specify where to scrape, how often to scrape, and how what to do with the data.

3.1 Create Necessary Directories: Create all folders to exclude permission errors during operation.

sudo mkdir -p /etc/prometheus/console_libraries /etc/prometheus/consoles /etc/prometheus/files_sd /etc/prometheus/rules /etc/prometheus/rules.d /var/lib/prometheus
tip

If folders already exist, they remain untouched. Otherwise, an empty folder will be created.

Full Folder Descriptions
PathPurpose
/etc/prometheus/console_librariesShared library snippets used by console dashboards.
/etc/prometheus/consolesWeb UI dashboard templates rendered on the Prometheus server.
/etc/prometheus/files_sdFile-based discovery configs for port metrics.
/etc/prometheus/rulesCustom alerting and recording rule files.
/etc/prometheus/rules.dSubdirectory for service rules like the validator, node, and ping checks.
/var/lib/prometheusStorage folder for all collected metrics.

3.2 Create Config File: Create a Prometheus configuration using your preferred text editor.

sudo vim /etc/prometheus/prometheus.yaml

3.3 Paste Configuration: Add the settings and exporter jobs to the configuration structure based on your client and currency.

tip

All properties will later on be used within the Grafana Dashboard to fetch the token prices and build metrics based on your node. The Prometheus data endpoints include the following sources:

  • Prometheus: Compiling All Data Sources and Database Storage
  • Consensus Client: Validator Count, Uptime, Connection, Participation Rate
  • Node Exporter: Storage Demand, Processor Utilization, Heat Distribution, Disk Utilization
  • Blackbox Exporter: Google and Cloudflare Pings, Latency Checks, Network Uptime
  • JSON Exporter: Daily and Weekly Income, Staking Position, Market Behaviour
  • Validator Client: Attestations and Proposals
global:
scrape_interval: 15s
evaluation_interval: 15s

scrape_configs:
- job_name: 'prometheus-job'
scrape_interval: 5s
static_configs:
- targets: ['127.0.0.1:9090']
- job_name: 'consensus-client-job'
scrape_interval: 5s
static_configs:
- targets: ['127.0.0.1:8008']
- job_name: 'node-exporter-job'
scrape_interval: 5s
static_configs:
- targets: ['127.0.0.1:9100']
- job_name: 'validator-client-job'
scrape_interval: 5s
static_configs:
- targets: ['127.0.0.1:8009']
- job_name: 'google-ping-job'
metrics_path: /probe
params:
module: [icmp]
static_configs:
- targets:
- 8.8.8.8
relabel_configs:
- source_labels: [__address__]
target_label: __param_target
- source_labels: [__param_target]
target_label: instance
- target_label: __address__
replacement: 127.0.0.1:9115 # The blackbox exporter's real hostname:port.
- job_name: 'cloudflare-ping-job'
metrics_path: /probe
params:
module: [icmp]
static_configs:
- targets:
- 1.1.1.1
relabel_configs:
- source_labels: [__address__]
target_label: __param_target
- source_labels: [__param_target]
target_label: instance
- target_label: __address__
replacement: 127.0.0.1:9115 # The blackbox exporter's real hostname:port.
- job_name: 'json-exporter-job'
static_configs:
- targets:
- 127.0.0.1:7979
- job_name: 'json'
metrics_path: /probe
static_configs:
- targets:
- https://api.coingecko.com/api/v3/simple/price?ids=lukso-token&vs_currencies=eur
relabel_configs:
- source_labels: [__address__]
target_label: __param_target
- source_labels: [__param_target]
target_label: instance
- target_label: __address__
replacement: 127.0.0.1:7979
tip

As shown in the Port Configuration, Nimbus-Eth2 exposes the consensus and validator data through one single port. Therefore the Prometheus configuration combines both, the consensus-client-job and the validator-client-job into a single beacon-client-job instance.

Global Settings and Scrape Parameter Descriptions
SettingDescription
scrape_intervalHow often Prometheus collects data from all targets, usually every 15s.
evaluation_intervalHow often recording or alerting rules are evaluated, usually every 15s.
job_nameIdentifier for each target group that listens to a local port.
metrics_pathPath where metrics are exposed, usually /metrics or /probe.
paramsUsed in Blackbox or JSON Exporter to pass query strings or URLs
static_configsList of targets to scrape, like the host:port of each service.
relabel_configsModified target labels, that map addresses to Blackbox or set an instance name.
Full Prometheus Job Descriptions
Job NameDescription
prometheus-jobScrapes internal metrics from the Prometheus server itself.
consensus-client-jobCollects blockchain metrics from the consensus client.
validator-client-jobPulls activity and performance data from the validator client.
beacon-client-jobCollects blockchain metrics from the consensus and validator client.
node-exporter-jobGathers hardware and OS metrics from the node using Node Exporter.
google-ping-jobUses Blackbox Exporter to probe Google DNS.
cloudflare-ping-jobUses Blackbox Exporter to probe Cloudflare DNS.
json-exporter-jobGathers staking metrics and API data from the JSON Exporter.
jsonSends requests to CoinGecko API through JSON Exporter for LYX price data.
warning

Ensure the correct formatting of double-spaces so that the Prometheus server functions correctly.

3.4 Restrict Permissions: Change the ownership and restrict execution within configuration folders to the service user.

# Prometheus Configuration, Files, Logging
sudo chown -R prometheus-worker:prometheus-worker /etc/prometheus

# Prometheus Database
sudo chown -R prometheus-worker:prometheus-worker /var/lib/prometheus
sudo chmod 755 /var/lib/prometheus

4. Service Configurationโ€‹

Once the software and dataset configuration are in place, we can create a service configuration, so it automatically starts during boot and restarts during crashes. The configuration will also check for logging and an internet connection before it starts up and uses the previously created user.

4.1 Create Service File: Create a system service file using your preferred text editor.

sudo vim /etc/systemd/system/prometheus.service

4.2 Add Configuration: Paste the following content using your preferred logging tool, then save and exit the file.

tip

Further details on Journal and System Logging can be found on the Utility Tools page in the the ๐Ÿง  Theory section.

[Unit]
Description=Prometheus
Documentation=https://github.com/prometheus/prometheus
Wants=network-online.target
After=network.target network-online.target

[Service]
User=prometheus-worker
Group=prometheus-worker
Type=simple
ExecStart=/usr/local/bin/prometheus \
--config.file /etc/prometheus/prometheus.yaml \
--storage.tsdb.path /var/lib/prometheus/ \
--storage.tsdb.retention.time=31d \
--web.console.templates=/etc/prometheus/consoles \
--web.console.libraries=/etc/prometheus/console_libraries
ExecReload=/bin/kill -HUP $MAINPIDRestart=always
RestartSec=5
SyslogIdentifier=prometheus
StandardOutput=journal
StandardError=journal
ProtectSystem=full
NoNewPrivileges=true
PrivateTmp=true

[Install]
WantedBy=multi-user.target
Full Property Explanation
PropertyDescription
DescriptionA human-readable description of the service shown in systemctl status.
DocumentationLink to documentation of the software that is being used for this service file.
WantsThe service should try to start network-online.target before starting Prometheus.
After- network.target: Ensures networking setup enabled before service is started.
- network-online.target: Waits for network to be fully online before service is started.
UserExecutes the service as the json-exporter-worker user.
GroupExecutes the service under the json-exporter-worker group.
TypeIndicates running at a simple service in the foreground without forking.
ExecStart- Link to binary at /usr/local/bin/prometheus, started with the terminal command.
ExecReloadSends a kill signal to the main process to restart and re-read all configuration files.
RestartSecDelay in seconds before restarting the service.
SyslogIdentifierTags logs from the service with json_exporter to help distinguish them.
StandardOutputSends regular service logs to the journal or syslog system.
StandardErrorSends error service logs to the journal or syslog system.
ProtectSystemRestricts filesystem write access outside of the service runtime.
NoNewPrivilegesPrevents privilege escalation which processes can be apply for.
PrivateTmpCreates an isolated /tmp directory for the service.
WantedByBinds the service to the multi-user.target, so it starts during all boot processes.
warning

If you renamed the user, make sure to update both User and Group values to prevent running the service as root.

5. Start the Prometheus Serviceโ€‹

After setting up the service, you can enable and start the system service.

5.1 Reload Daemon: Reload the system daemon to include the new service.

sudo systemctl daemon-reload

5.2 Start Service: Start the Prometheus service using the system control.

sudo systemctl start prometheus

5.3 Enable Autostart on Boot: Enable the service to start automatically during boot.

sudo systemctl enable prometheus

The output should look similar to this:

Created symlink /etc/systemd/system/multi-user.target.wants/prometheus.service โ†’ /etc/systemd/system/prometheus.service.

6. Check Service Statusโ€‹

You can fetch the current status from the system control to check if the Prometheus service is running and configured correctly. The command will display whether it is active, enabled, or disabled and show recent log entries.

sudo systemctl status prometheus

The output should look similar to this:

โ— prometheus.service - Prometheus
Loaded: loaded (/etc/systemd/system/prometheus.service; enabled; vendor preset: enabled)
Active: active (running) since [DATE] UTC; [TIME] ago
Docs: https://github.com/prometheus/prometheus
Main PID: 29468 (prometheus)
Tasks: 17 (limit: 38043)
Memory: 27.4M
CPU: 293ms
CGroup: /system.slice/prometheus.service
โ””โ”€29468 /usr/local/bin/prometheus --config.file /etc/prometheus/prometheus.yaml --storage.ts>

[DATE] [TIME] [USER] prometheus[29468]: ts=2023-05-18T09:43:54.539Z caller=head.go:536 level=info > ...
...

Maintenanceโ€‹

Proper maintenance ensures that all the components are working as intended and can be updated on the fly.

Logging: Check the latest status of the system service.

sudo journalctl -f -u prometheus

Restarting: If you made any changes or updates to configuration, reload the system daemon and start the exporter.

sudo systemctl daemon-reload
sudo systemctl restart prometheus

Stopping: You can stop the exporter using the system control.

sudo systemctl stop prometheus
tip

Further information about system control or logging can be found on the Utility Tools page in the ๐Ÿง  Theory section.

Revert Setupโ€‹

If something went wrong, you can remove the user or delete the service and related files all together.

1. Stop and Disable Service: Stop the tool and remove it's service link from the system's boot.

sudo systemctl stop prometheus
sudo systemctl disable prometheus

2. Change Binary Ownership: Change the owner of the Prometheus and Promtool executables.

sudo chown -R root:root /usr/local/bin/prometheus
sudo chown -R root:root /usr/local/bin/promtool

3. Change Folder Ownership: Change the owner of the configuration and database folers.

sudo chown -R root:root /etc/prometheus
sudo chown -R root:root /var/lib/prometheus

4. Remove the Service and Config Files: Delete all service files and reload the system daemon.

sudo rm /etc/systemd/system/prometheus.service
sudo rm -rf /etc/prometheus
sudo rm -rf /var/lib/prometheus/
sudo systemctl daemon-reload

5. Delete Binary: Remove the executable Prometheus and Promtool from your system.

sudo rm -rf /usr/local/bin/prometheus
sudo rm -rf /usr/local/bin/promtool

6. Remove User and Group: Prune the user and all it's cached configurations.

sudo deluser --remove-all-files prometheus-worker
sudo delgroup prometheus-worker