Open Source
Free Kubernetes CronJob monitoring.
Zero config. Zero cost.
Auto-discover every CronJob in your cluster. Track execution, detect failures, alert on missed schedules — all through Prometheus and Grafana. Installs in 60 seconds.
The Problem
Kubernetes CronJobs fail silently.
Your nightly backup didn't run? Your report generator has been broken for a week? You won't know until someone complains. Existing solutions are either expensive SaaS tools that require per-job configuration, or hours of DIY Prometheus PromQL wrangling.
The Solution
One Helm command. Zero configuration.
Every CronJob monitored automatically. Varax Monitor uses Kubernetes Informers to detect every CronJob in your cluster and exports clean Prometheus metrics. No per-job setup. No annotations. It just works.
$ helm install varax-monitor varaxlabs/varax-monitor ✓ Monitoring 14 CronJobs across 3 namespaces
Everything you need for CronJob observability
Auto-Discovery
Detects every CronJob in your cluster automatically using Kubernetes Informers. Add a new CronJob? It's monitored instantly.
Pre-Built Dashboards
Import the included Grafana dashboard and see all your CronJobs in one view. Execution history, success rates, duration trends.
Smart Alert Rules
Pre-configured Prometheus alerts for job failures, missed schedules, abnormal duration, and stuck jobs.
Prometheus Native
Exports clean, well-labeled Prometheus metrics. Works with your existing monitoring stack. No new tools to learn.
Lightweight
Under 50MB memory, under 0.05 CPU. Read-only cluster access. No persistent storage needed.
100% Free
Apache 2.0 licensed. No per-job pricing. No telemetry. No vendor lock-in.
Metrics at a glance
Clean, well-labeled Prometheus metrics for every CronJob in your cluster.
| Metric | Type | Description |
|---|---|---|
| cronjob_last_execution_status | Gauge | Last execution result (1=success, 0=failure) |
| cronjob_last_execution_duration_seconds | Gauge | Duration of last execution |
| cronjob_execution_total | Counter | Total executions (labeled success/failure) |
| cronjob_missed_schedules_total | Counter | Missed schedule count |
| cronjob_next_schedule_time | Gauge | Unix timestamp of next expected run |
| cronjob_is_suspended | Gauge | Whether the CronJob is suspended |
Also from Varax Labs
Your CronJobs are monitored. But is your cluster compliant?
Varax scans your Kubernetes cluster for SOC2 violations and generates audit-ready reports with one CLI command. Same Kubernetes-native approach. Same zero-config philosophy.
Monitor every CronJob in your cluster. Free forever.
$ helm install varax-monitor varaxlabs/varax-monitor