Snowplow Inspector
Snowplow recommends using the Snowplow Inspector browser extension for validating your tracking code. To install in Chrome, Edge and other Chromium-based browsers, find Snowplow Inspector on the chrome web store.
Firefox users can install the extension manually using an .xpi file from the GitHub Releases page.
The Snowplow Inspector is not supported on Safari at this time.
The code for the Snowplow Inspector is available on GitHub.
Once you add the extension to your browser, you can view it by opening Developer Tools, where it has its own tab named Snowplow (look for the tab adjacent to Console, Network, etc. It may be necessary to expand the list of tabs using the » button).
Common keyboard shortcuts to open Developer Tools include:
- PC: Ctrl+Shift+I
- Mac: Cmd+Option+I
How it works#
As you browse a webpage you can perform different actions that you can track as Snowplow events. These events get sent as HTTP requests to the Snowplow Collector that's configured for the tracker on each webpage. The Snowplow Inspector extension observes and parses these HTTP requests for display in a more easily readable format. This allows anyone with the extension to more easily see which actions on a webpage trigger Snowplow events to send to a Snowplow pipeline.
You can debug standard Snowplow events, and Signals attributes and interventions using the Inspector. Choose which data type you want to look at using the vertical tabs on the left-hand side of the extension: Events, Attributes, and Interventions.
The Events tab shows the usual event debugging functionality. The inspector shows a list of all the events received in the order they were fired, with more recent events at the top. Click on each event to see its details.
In the example below, events fired as HTTP POST requests from the Snowplow homepage:
- An automatic self-describing
web_vitalsevent. - A
page_viewevent. - A second
page_viewevent from an embedded iframe on the page. It has a blue dot because its App ID and Collector combination are distinct from the other events, which have red dots because they share an App ID/Collector. - A self-describing
link_clickevent. - Two
page_pingevents.

Within the parsed HTTP request bodies that contain event payloads are a variety of Snowplow canonical event fields, such as unique event_id, timestamps, user and session identifiers, as well as any custom event or entity fields.
Try it out#
Once you've installed the extension, you can try it out immediately by visiting a webpage with Snowplow tracking. For example, the Snowplow website, or this documentation site. You don't need a Snowplow account to use the extension.
Use in event QA#
The Snowplow Inspector extension is useful for debugging any web tracking implementation. For questions such as "why is X event not appearing in the data warehouse", the extension allows you to see if the event is actually firing.
Additionally, you can configure the extension to show whether or not an event has passed validation according to any event validation rules codified in the corresponding schema.
For events that failed validation in production historically that you are unable to replicate in your own browser, see the guides on how to query failed events. These failed events have a specific format that includes an array of helpful, detailed error messages that explain the exact reasons why the event failed validation. You can also import bad events into the extension to view as if your browser had generated them itself.