No description
Find a file
2022-11-16 22:50:48 +01:00
.github Add experimental support for basic auth and TLS (#23) 2022-11-16 22:19:08 +01:00
.homebridge Fix development environment 2022-11-09 00:41:02 +01:00
code-generation Automate code generation for config schema (#16) 2022-11-10 13:06:16 +01:00
src Fall back to IPv4 if EAFNOSUPPORT (#24) 2022-11-16 22:47:41 +01:00
tests Add experimental support for basic auth and TLS (#23) 2022-11-16 22:19:08 +01:00
.eslintrc.js Explicit type imports 2022-11-13 13:34:09 +01:00
.gitignore Ignore local release script 2022-11-10 13:54:12 +01:00
.npmignore Use code generation for UUID service map (#14) 2022-11-10 11:07:31 +01:00
.release-it.json Run npm test in CI mode for releases 2022-11-10 13:43:23 +01:00
CHANGELOG.md Set up release-it as the release management tool (#18) 2022-11-10 13:40:34 +01:00
config.schema.json Add experimental support for basic auth and TLS (#23) 2022-11-16 22:19:08 +01:00
flake.lock Initial version 2022-11-07 15:23:48 +01:00
flake.nix Replace runtypes with zod, validate config, stricter eslint config 2022-11-08 19:13:34 +01:00
jest.config.js Initial version 2022-11-07 15:23:48 +01:00
LICENSE Initial commit 2022-11-06 13:04:30 +01:00
nodemon.json Fix development environment 2022-11-09 00:41:02 +01:00
package-lock.json Release 0.0.11 2022-11-16 22:50:48 +01:00
package.json Release 0.0.11 2022-11-16 22:50:48 +01:00
prettier.config.js Initial version 2022-11-07 15:23:48 +01:00
README.md Add experimental support for basic auth and TLS (#23) 2022-11-16 22:19:08 +01:00
tsconfig.json Cache expensive CI steps (#21) 2022-11-14 02:43:27 +01:00

Homebridge logo Plus sign Prometheus logo

Homebridge Prometheus Exporter CI

What if we could store homebridge metrics in Prometheus

homebridge-prometheus-exporter is a plugin for homebridge that provides a metrics endpoint for Prometheus to scrape. Once the metrics are in Prometheus, they can be consumed and presented in various ways. One can use Prometheus Alerting Rules to trigger actions on certain thresholds or Grafana to build informative graphs or alerts.

A Grafana timeseries showing wattage and voltage of two home appliances on a timeseries chart

Installing

Install the plugin

Run this command to install the plugin as a global nodejs module:

npm install -g homebridge-prometheus-exporter

Configure homebridge

Edit the homebridge config.json to load the plugin:

{
    // …
    "platforms": [
    {
      "platform": "PrometheusExporter",
      "pin": "123-12-123",
    },
    // …
  ]
}

Customize homebridge startup

For homebridge-prometheus-exporter to work, homebridge has to run in "insecure mode". This means that any user who has access to your network can control your homebridge devices. This is usually not a big problem but it is still something you should consciously decide. homebridge-config-ui-x requires running in insecure mode if you want to control your devices from homebridge-config-ui-x.

To enable "insecure mode", edit the startup script for homebridge and add --insecure or -I. Assuming you run systemd, the proper way to override the config would be to use systemds drop-in mechanism.

Create /etc/systemd/system/homebridge.service.d folder:

mkdir /etc/systemd/system/homebridge.service.d

Write this drop-in configuration file to /etc/systemd/system/homebridge.service.d/insecure.conf:

[Service]
ExecStart=
ExecStart=/usr/lib/node_modules/homebridge/bin/homebridge --insecure

The first and empty ExecStart tells systemd to forget about the ExecStart from the original service definition and the second ExecStart declares the new file. Run systemctl daemon-reload to refresh systemds unit database and then run systemd-delta --type=extended to check if the drop-in worked as expected.

You should see something like this in the output:

…
[EXTENDED]   /lib/systemd/system/homebridge.service → /etc/systemd/system/homebridge.service.d/insecure.conf
…

If you are not using systemd, first of all, you absolutely should but second of all you will likely have some sort of env file, e.g. /etc/defaults/homebridge to customize the homebridge start command. Restart homebridge using systemctl restart homebridge.

Test that the metrics endpoint is available by accesing http://homebridge-host:36123/metrics. You should see a response similar to this:

# TYPE homebridge_air_purifier_active gauge
homebridge_air_purifier_active{name="…",…} 0 1667914208196
# TYPE homebridge_air_purifier_current_air_purifier_state gauge
homebridge_air_purifier_current_air_purifier_state{name="…",…} 0 1667914208196

Configuring Prometheus

With homebridge-prometheus-exporter up and running, it is now time to configure Prometheus to scrape the config endpoint. Go to your prometheus host and edit /etc/prometheus/prometheus.yml and add the following scrape config:


scrape_configs:
  - job_name: homebridge-exporter
    static_configs:
    - targets:
      - homebridge-host:36123

Once Prometheus is restarted, metrics with the homebridge_ prefix should start to be ingested.

Customize homebridge-prometheus-exporter

homebridge-prometheus-exporter offers a few advanced settings to customize its behavior.

{
  // …
  "platforms": [
    {
      "platform": "PrometheusExporter",
      // Homebridge PIN for service authentication. String of digits, format XXX-XX-XXX. Required
      "pin": string,

      // Toggle debug mode. Run homebridge with -D if you want to see the debug output. Default: false
      "debug": boolean,

      // Prefix for all metrics. Default: "homebridge"
      "prefix": string,

      // TCP port where the Prometheus metrics server listens. Default: 36123
      "port": number,

      // How frequently the services should be rediscovered (in seconds). Default: 60
      "refresh_interval": number,

      // Timeout for the HTTP request that retrieves the homekit devices (in seconds). Default: 10
      "request_timeout": number,

      // Timeout for the service discovery (in seconds). Default: 20
      "discovery_timeout": number,

      // Path to TLS certificate file (in PEM format)
      "tls_cert_file": string,

      // Path to TLS key file
      "tls_key_file": string,

      // Usernames and passwords for basic auth. Key is the username, value is the password.
      // Password must be encoded with bcrypt
      "basic_auth": {
        "username": "<password encoded with bcrypt>"
      }
    },
    // …
  ]
}