Uptime Kuma¶
Uptime Kuma is a self-hosted monitoring tool that provides synthetic HTTP/TCP/DNS checks against services and a status page. It monitors services from inside the cluster, complementing Prometheus-based metrics with "can I reach this endpoint?" checks.
Details¶
| Property | Value |
|---|---|
| Helm chart | app-template v4.6.2 (bjw-s) |
| Image | louislam/uptime-kuma:2.2.1 |
| Port | 3001 |
| HTTPRoute | status.homelab.local |
| Namespace | monitoring |
| ArgoCD app | uptime-kuma |
| Sync wave | 2 |
Storage¶
| Volume | Type | Size | Mount Path |
|---|---|---|---|
data |
PVC (nfs-client) |
1Gi | /app/data |
Resources¶
| CPU | Memory | |
|---|---|---|
| Requests | 25m | 128Mi |
| Limits | -- | 256Mi |
Key Configuration¶
- Database: SQLite (
UPTIME_KUMA_DB_TYPE: sqlite), stored on the NFS-backed PVC. - Authentik forward-auth protects the web UI (same pattern as other arr apps).
- Startup probe allows up to 30 failures at 5-second intervals to account for initial database setup.
Post-Deploy Setup¶
- Add
status.homelab.localto DNS (if not using a wildcard record). - Create an Authentik application and proxy provider for
status.homelab.local. - Open
https://status.homelab.localand create an admin account. -
Add HTTP monitors for each service:
Monitor URL Jellyfin https://jellyfin.homelab.localSonarr https://sonarr.homelab.localRadarr https://radarr.homelab.localProwlarr https://prowlarr.homelab.localBazarr https://bazarr.homelab.localSeerr https://seerr.homelab.localqBittorrent https://qbit.homelab.localTdarr http://tdarr.homelab.localOpenClaw https://openclaw.homelab.localGrafana https://grafana.homelab.localPrometheus https://prometheus.homelab.localAlertmanager https://alertmanager.homelab.localUptime Kuma https://status.homelab.localGoldilocks https://goldilocks.homelab.localArgoCD https://argocd.homelab.localVault https://vault.homelab.localAuthentik https://auth.homelab.localHomepage https://home.homelab.local
Note
Uptime Kuma monitors from within the cluster. For TLS checks to work against *.homelab.local endpoints using the internal CA, the monitors should be configured to accept self-signed certificates (or use HTTP checks against the internal service URLs instead).
Dependencies¶
| Dependency | Purpose |
|---|---|
| Cilium Gateway | HTTPRoute routing |
| cert-manager | TLS certificate |
| Authentik | Forward-auth SSO |