Use Grafana & Prometheus to monitor Mikrotik devices. This projects serves as a ready to use blueprint for monitoring based on Docker. It is designed and tested to be run on Raspberry Pis.
- System Health Monitoring
- disk usage
- CPU load
- memory usage
- public IP address (IPv4 & IPv6)
- system uptime
- temperature
- voltage monitoring
- Interface Monitoring
- traffic (bit/s)
- traffic (packets/s)
- per interface graphs
- Latency Monitoring
- customizable ICMP and/or UDP pings
- packet loss
- DHCP Monitoring
- active leases
- MAC addresses, host names, addresses
- Network Monitoring
- routes
- interfaces errors
- interface states
- PoE states
- Firewall Monitoring
- rules traffic
- logged rules traffic
- Ipv4 & IPv6
- bandwidth
- active users
- Wireless Monitoring
- noise floor
- TxCCQ
- client devices
- number of clients
- traffic
- signal strength
- signal to noise ratio
- Netwatch
- CAPsMAN Monitoring
- remote CAPS
- registrations
- clients
- frequencies
- signal strength
- traffic
- Router running RouterOS 7.x.x
- Raspberry Pi 4 with 2 gb RAM (other PIs may also work, but I wanted ARM 64 bit)
- before opening a new issue, please take a look at the FAQ
At first you need to prepare your router.
Create a group on the device that has API and read-only access:
/user group add name=prometheus policy=api,read,winbox,test
Create a user that is part of the group:
/user add name=prometheus group=prometheus password=TOP_SECRET
You need Ubuntu Server for ARM 64 bit in order to use this setup. You may also use Raspian, but then you are limited to 32bit ARM executables. This would mean, that you need to compile the mikrotik-exporter
by hand, because there are no pre built 32-bit Docker images.
You need to execute the following steps on the target machine itself (e.g. Raspberry Pi).
Install Docker (official docs):
sudo apt-get install docker-ce docker-ce-cli containerd.io docker-buildx-plugin docker-compose-plugin
docker-compose
was originally written in Python, but it was deprecated some time ago. Migrate to Compose V2.
Optional: Build the Docker Image for mktxp
It might be necessary to build the Docker Image for: https://github.com/akpw/mktxp. This is especially the case, if your architecture is not:
- linux/amd64
- linux/arm/v7
- linux/arm64
# Get the mktxp repository
git clone https://github.com/akpw/mktxp.git
# Go into the newly downloaded repo
cd mktxp
# Build the docker image
docker build . -t leonmorten/mktxp:latest
Now get this repo and install all services:
# Clone this repo
git clone https://github.com/M0r13n/mikrotik_monitoring.git
# Go into the cloned directory
cd mikrotik_monitoring
# Let docker-compose do it's job
docker compose up -d
You may need to adjust the following configuration files and add your own credentials for your router:
mktxp/mktxp.conf
Done. You should now be able to open the Grafana dashboard on Port 3000 of your Raspberry Pi.
This projects uses the Prometheus Blackbox exporter to measure network latency. By default three targets are configured:
- 1.1.1.1 (Cloudflare)
- 8.8.8.8 (Google)
- 9.9.9.9 (IBM)
You may adjust blackbox/blackbox.yml according to your needs.
It is possible to monitor multiple (Mikrotik) devices. Just change add as many devices to mktxp/mktxp.conf
as you want.
It is also possible to access the Grafana Dashboard over HTTPS. Depending on your security requirements and/or threat model it might be a good idea to enable HTTPS.
Generate a self signed certificate for your domain:
sudo openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout ./nginx/nginx-selfsigned.key -out ./nginx/nginx-selfsigned.crt
Replace the content of ./nginx/nginx.conf
with:
server {
listen 80;
listen [::]:80;
server_name _;
return 301 https://$host$request_uri;
}
server {
listen 443 ssl;
listen [::]:443 ssl;
include ssl/self-signed.conf;
location / {
proxy_set_header Host $http_host;
proxy_pass http://grafana:3000/;
}
}
Under ./docker-armor
you can find an AppArmor profile for this stack. To use it, do the following:
cp ./docker-armor /etc/apparmor.d/docker-armor
apparmor_parser -r -W /etc/apparmor.d/docker-armor
docker compose -f docker-compose-armored.yml up -d
- A blog post by Devin Smith that first got me interested
- A somewhat useable Grafana Dashboard
- A Prometheus exporter for Mikrotik devices written in Python.
- A Prometheus exporter for Mikrotik devices written in Go
- Prometheus Blackbox exporter
It might happen that the Grafana dashboard loads, but the graphs remain empty. If the dashboard loads, but no data is shown, this may be caused by any of the following reasons:
- invalid credentials for the monitored RouterOS device
- verify with:
/user/print detail
- verify with:
- invalid host and port for the monitored RouterOS device
- check that the IP or host name of the monitored device is correct
- API service disabled on the RouterOS device
- verify with
/ip/service/print detail
- verify with
This project is only a personal hobby. It do it mainly to learn something and to improve my skills. Therefore, the project does not compete with other projects. Nor do I aim for completeness or perfection. The goal of this project is to develop a monitoring solution for multiple RouterOS devices simultaneously that is resource-efficient and scalable.
Firstly SNMP based monitoring is painfully slow. In my experience SNMP walks are slow and CPU heavy. And I am not alone with this. In my experience the API is much faster and produces less stress on the CPU of the monitored device.
Secondly I never really got used to the way that SNMP metrics and queries are structured. I find them very hard to read.
In addition, the API offers a lot of flexibility. Any command can be executed on RouterOS via the API. Thus it is possible to collect complex metrics.
When bind-mounting a directory from the host into a container, files and directories
maintain the permissions they have on the host. These can not be changed by Docker.
Typically, a bind-mounted directory has permissions like these: rwxrwxr-x
.
This means that the container can read from the bind-mounted directory. But it can not
write or modify the mounted files.
This mostly works fine. But the Prometheus exporter mktxp has a specialty:
It may update it's configuration if some keys are missing from the configuration file.
Imagine, that the key ipv6_firewall
is missing from the mktxp.conf. In this case
mktxp will add ipv6_firewall=false
to the configuration file instead of failing.
This is a helpful feature, but can cause the container to crash, if the user inside
the container lacks write permissions.
In order to resolve this issue, make sure that all keys that mktxp currently supports are listed in your mktxp.conf file.