can prometheus ingest data from graphite? If yes truenas can already add a graphite exporter. Another option would be intsead of prometheus to use the graphite exporter to influxdb and then to grafana.
A graphite exporter mapping file for truenas scale >23.10.1 metrics and some example grafana dashboards
Going forward from exporter configuration version 2.1, you must also use the Netdata configuration included in the repository to restore the pre‑25.04 metrics. Instructions are provided below. This action is taken since TrueNAS 25.04 dropped a lot of default metrics which doesn’t make sense for me.
But I have see in /etc/netdata/netdata.conf, you can enable more metrics.
I don’t understand why they have not implemented this netdata plugin : ZFS Pools | Learn Netdata.
Yes, I have see and test the work to suppoterino.
But do you think it is normal to do all this stuff for only scrape metrics ?
why in something like octoprint, 2 click and it is finnish ?
A 3D printer software (Octoprint) is more monitor friendly than a NAS pro software (TrueNAS), why ?
It seems to be due to licensing issues? Although I don’t know why netdata had to be chosen in the first place, and then some things started being removed because of other problems
services:
smartctl-exporter:
environment:
NVIDIA_VISIBLE_DEVICES: void
TZ: Europe/Vienna
group_add:
- 568
image: prometheuscommunity/smartctl-exporter:latest
network_mode: host
platform: linux/amd64
privileged: True
pull_policy: always
restart: unless-stopped
stdin_open: False
tty: False
user: '0:0'
x-notes: >
# iX App
## Security
**Read the following security precautions to ensure that you wish to continue
using this application.**
---
### Container: [smartctl-exporter]
#### Privileged mode is enabled
- Has the same level of control as a system administrator
- Can access and modify any part of your TrueNAS system
#### Running user/group(s)
- User: root
- Group: root
- Supplementary Groups: apps
#### Security option [no-new-privileges] is not set
- Processes can gain additional privileges through setuid/setgid binaries
- Can potentially allow privilege escalation attacks within the container
---
version: '3.8'
services:
smartctl_exporter:
image: prometheuscommunity/smartctl-exporter:latest
container_name: smartctl-exporter
network_mode: host
user: root
devices:
- "/dev:/dev" # Nur das NVMe-Gerät
restart: unless-stopped
## Bug Reports and Feature Requests
If you find a bug in this app or have an idea for a new feature, please file
an issue at
https://github.com/truenas/apps
x-portals:
- host: 0.0.0.0
name: Web UI
path: /metrics
port: 9633
scheme: http
maybe someone finds it useful: feedback very much appriciated
There is also SNMP. It’s a bit old fashioned but if you only need basic monitoring for pool health, cpu usage, network usage, disk temperatures, etc. it does the job.