Skip to main content

Tor

Plugin: go.d.plugin Module: tor

Overview

Tracks Tor's download and upload traffic, as well as its uptime.

It reads the server's response to the GETINFO command.

This collector is supported on all platforms.

This collector supports collecting metrics from multiple instances of this integration, including remote instances.

Default Behavior

Auto-Detection

By default, it detects Tor instances running on localhost that are listening on port 9051. On startup, it tries to collect metrics from:

  • 127.0.0.1:9051

Limits

The default configuration for this integration does not impose any limits on data collection.

Performance Impact

The default configuration for this integration is not expected to impose a significant performance impact on the system.

Metrics

Metrics grouped by scope.

The scope defines the instance that the metric belongs to. An instance is uniquely identified by a set of labels.

Per Tor instance

These metrics refer to the entire monitored application.

This scope has no labels.

Metrics:

MetricDimensionsUnit
tor.trafficread, writeKiB/s
tor.uptimeuptimeseconds

Alerts

There are no alerts configured by default for this integration.

Setup

You can configure the tor collector in two ways:

MethodBest forHow to
UIFast setup without editing filesGo to Nodes → Configure this node → Collectors → Jobs, search for tor, then click + to add a job.
FileIf you prefer configuring via file, or need to automate deployments (e.g., with Ansible)Edit go.d/tor.conf and add a job.
important

UI configuration requires paid Netdata Cloud plan.

Prerequisites

Enable Control Port

Enable ControlPort in /etc/tor/torrc.

Configuration

Options

The following options can be defined globally: update_every, autodetection_retry.

Config options
OptionDescriptionDefaultRequired
update_everyData collection frequency.1no
autodetection_retryRecheck interval in seconds. Zero means no recheck will be scheduled.0no
addressThe IP address and port where the Tor's Control Port listens for connections.127.0.0.1:9051yes
timeoutConnection, read, and write timeout duration in seconds. The timeout includes name resolution.1no
passwordPassword for authentication.no

via UI

Configure the tor collector from the Netdata web interface:

  1. Go to Nodes.
  2. Select the node where you want the tor data-collection job to run and click the (Configure this node). That node will run the data collection.
  3. The Collectors → Jobs view opens by default.
  4. In the Search box, type tor (or scroll the list) to locate the tor collector.
  5. Click the + next to the tor collector to add a new job.
  6. Fill in the job fields, then click Test to verify the configuration and Submit to save.
    • Test runs the job with the provided settings and shows whether data can be collected.
    • If it fails, an error message appears with details (for example, connection refused, timeout, or command execution errors), so you can adjust and retest.

via File

The configuration file name for this integration is go.d/tor.conf.

The file format is YAML. Generally, the structure is:

update_every: 1
autodetection_retry: 0
jobs:
- name: some_name1
- name: some_name2

You can edit the configuration file using the edit-config script from the Netdata config directory.

cd /etc/netdata 2>/dev/null || cd /opt/netdata/etc/netdata
sudo ./edit-config go.d/tor.conf
Examples
Basic

A basic example configuration.

Config
jobs:
- name: local
address: 127.0.0.1:9051
password: somePassword

Multi-instance

Note: When you define multiple jobs, their names must be unique.

Collecting metrics from local and remote instances.

Config
jobs:
- name: local
address: 127.0.0.1:9051
password: somePassword

- name: remote
address: 203.0.113.0:9051
password: somePassword

Troubleshooting

Debug Mode

Important: Debug mode is not supported for data collection jobs created via the UI using the Dyncfg feature.

To troubleshoot issues with the tor collector, run the go.d.plugin with the debug option enabled. The output should give you clues as to why the collector isn't working.

  • Navigate to the plugins.d directory, usually at /usr/libexec/netdata/plugins.d/. If that's not the case on your system, open netdata.conf and look for the plugins setting under [directories].

    cd /usr/libexec/netdata/plugins.d/
  • Switch to the netdata user.

    sudo -u netdata -s
  • Run the go.d.plugin to debug the collector:

    ./go.d.plugin -d -m tor

    To debug a specific job:

    ./go.d.plugin -d -m tor -j jobName

Getting Logs

If you're encountering problems with the tor collector, follow these steps to retrieve logs and identify potential issues:

  • Run the command specific to your system (systemd, non-systemd, or Docker container).
  • Examine the output for any warnings or error messages that might indicate issues. These messages should provide clues about the root cause of the problem.

System with systemd

Use the following command to view logs generated since the last Netdata service restart:

journalctl _SYSTEMD_INVOCATION_ID="$(systemctl show --value --property=InvocationID netdata)" --namespace=netdata --grep tor

System without systemd

Locate the collector log file, typically at /var/log/netdata/collector.log, and use grep to filter for collector's name:

grep tor /var/log/netdata/collector.log

Note: This method shows logs from all restarts. Focus on the latest entries for troubleshooting current issues.

Docker Container

If your Netdata runs in a Docker container named "netdata" (replace if different), use this command:

docker logs netdata 2>&1 | grep tor

Do you have any feedback for this page? If so, you can open a new issue on our netdata/learn repository.