https://www.zabbix.com/documentation/3.4/manual/appliance

Configuration

1Hosts and host groups

Overview:

1Typical Zabbix hosts are the devices you wish to monitor (servers, workstations, switches, etc).

2creating hosts is one of the first monitoring tasks in zabbix.

3hosts are organized into host groups.

1.1configuring a host

1.1.1create a host

Step

Detail

note

Go to: ConfigurationHosts

Click on Create host

Enter parameters of the host in the form

You can also use the Clone and Full clone buttons in the form of an existing host to create a new host.

Note:

1Clicking on Clone will retain all host parameters and template linkage (keeping all entities from those templates)

2Full clone will additionally retain directly attached entities (applications, items, triggers, graphs, low-level discovery rules and web scenarios).

3 When a host is cloned, it will retain all template entities as they are originally on the template. Any changes to those entities made on the existing host level (such as changed item interval, modified regular expression or added prototypes to the low-level discovery rule) will not be cloned to the new host; instead they will be as on the template.

1.1.2configuration

1.1.2.1Host tab

Parameter

Description

Host name

Enter a unique host name. Alphanumerics, spaces, dots, dashes and underscores are allowed.
Note: With Zabbix agent running on the
host you are configuring, the agent configuration file parameterHostname must have the same value as the host
name entered here. The name in the parameter is needed in the processing of active checks.

Visible
name

If
you set this name, it will be the one visible in lists, maps, etc. This
attribute has UTF-8 support.

Groups

Select
host groups the host belongs to. A host must belong to at least one host
group.

New
host group

A
new group can be created and linked to the host. Ignored, if empty.

Interfaces

Several
host interface types are supported for a host: AgentSNMPJMX and IPMI.
To add a new interface, click on Add in
the Interfaces block and enter IP/DNSConnect
to
 and Port
info.
Note: Interfaces that are used in any items
cannot be removed and link Remove is greyed out for them.
Use bulk requests option
for SNMP interfaces allows to enable/disable bulk processing of SNMP requests per interface.

IP
address

Host
IP address (optional).

DNS name

Host DNS name (optional).

Connect
to

Clicking
the respective button will tell Zabbix server what to use to retrieve data
from agents:
IP - Connect to the host IP address
(recommended)
DNS - Connect to the host DNS name

Port

TCP/UDP
port number. Default values are: 10050 for Zabbix agent, 161 for SNMP agent,
12345 for JMX and 623 for IPMI.

Default

Check
the radio button to set the default interface.

Description

Enter
the host description.

Monitored
by proxy

The
host can be monitored either by Zabbix server or one of Zabbix proxies:
(no proxy) - host is monitored by Zabbix server
Proxy name - host is monitored by Zabbix proxy
“Proxy name”

Enabled

Mark
the checkbox to make the host active, ready to be monitored. If unchecked,
the host is not active, thus not monitored.

1.1.2.2 Templates tab

1)Link
templates

Step

Detail

note

start
typing in the Link new templates
field until a list of matching templates appear.

The Templates
tab allows you to link templates to the host. All entities (items, triggers,
graphs and applications) will be inherited from the template.

Scroll down to select.

click on Add.

2)unlink
template

method

Detail

note

Method
1

Unlink - unlink the template, but
preserve its items, triggers and graphs

Method 2

nlink and clear - unlink the template and
remove all its items, triggers and graphs

1.1.2.3 IPMI tab

Parameter

description

note

Authentication algorithm

Select the authentication algorithm.

Privilege level

Select the privilege level.

Username

User name for authentication.

Password

Password for authentication.

1.1.2.4 Macros tab

1)The Macros tab allows you to define
host-level user macros.

2) You may also view here template-level
and global macros if you select the Inherited and host macros option. That is
where all defined user macros for the host are displayed with the value they
resolve to as well as their origin

3) For convenience, links to respective
templates and global macro configuration are provided. It is also possible to
edit a template/global macro on the host level, effectively creating a copy of
the macro on the host.

1.1.2.5 Host inventory tab

1)allows you to manually enter inventory
information for the host.

2) You can also select to enable Automatic
inventory population, or disable inventory population for this host.

1.1.2.6 Encryption tab

allows you to require encrypted connections
with the host.

Parameter

description

note

Connections to host

How Zabbix server or proxy connects to
Zabbix agent on a host: no encryption (default), using PSK (pre-shared key)
or certificate.

Connections to host

Connections from host

Select what type of connections are
allowed from the host (i.e. from Zabbix agent and Zabbix sender). Several
connection types can be selected at the same time (useful for testing and
switching to other connection type). Default is “No encryption”.

Connections from host

Issuer

Allowed issuer of certificate.
Certificate is first validated with CA (certificate authority). If it is
valid, signed by the CA, then the Issuer field can be used to further
restrict allowed CA. This field is intended to be used if your Zabbix
installation uses certificates from multiple CAs. If this field is empty then
any CA is accepted.

Issuer

Subject

Allowed subject of certificate.
Certificate is first validated with CA. If it is valid, signed by the CA,
then the Subject field can be used to allow only one value of Subject string.
If this field is empty then any valid certificate signed by the configured CA
is accepted.

Subject

PSK identity

Pre-shared key identity string.

PSK identity

PSK

Pre-shared key (hex-string). Maximum
length: 512 hex-digits (256-byte PSK) if Zabbix uses GnuTLS or OpenSSL
library, 64 hex-digits (32-byte PSK) if Zabbix uses mbed TLS (PolarSSL)
library. Example:
1f87b595725ac58dd977beef14b97461a7c1045b9a1c963065002c5473194952

PSK

1.1.3configuring host group

Step

Detail

note

Go to:
ConfigurationHost groups

Click on Create Group in the upper right corner of the screen

Enter parameters of the group in the form

Parameter

description

note

Group name

Enter a unique
host group name.
To create a nested host group, use the '/' forward slash separator, for
exampleEurope/Latvia/Riga/Zabbix servers. You can create this group even if
none of the three parent host groups (Europe/Latvia/Riga) exist. In this case
creating these parent host groups is up to the user; they will not be created
automatically.
Leading and trailing slashes, several slashes in a row are not allowed.
Escaping of '/' is not supported.
Nested representation of host groups is supported since Zabbix 3.2.0.

Hosts

Select hosts,
members of the group. A host group may have zero, one or more hosts.

Apply
permissions to all subgroups

Mark this
checkbox and click on Update to apply the same level of
permissions to all nested host groups. For user groups that may have had
differing permissionsassigned to
nested host groups, the permission level of the parent host group will be
enforced on the nested groups.
This is a one-time option that is not saved in the database. It is available
to Zabbix Super Admin users only and only when editing an existing host
group.
This option is supported since Zabbix 3.4.0.

Permissions
to nested host groups

1)     
When creating a child host
group to an existing parent host group, user group permissions to the child are
inherited from the parent (for example, when creating Riga/Zabbix servers if
Riga already exists)

2)     
When creating a parent host group
to an existing child host group, no permissions to the parent are set (for
example, when creating Riga if Riga/Zabbix servers already exists)

1.2Inventory

Overview:

1)You can keep the inventory of networked
devices in Zabbix.

2) However, you will not see any data there
initially and it is not where you enter data.

3) Building inventory data is done manually
when configuring a host or automatically by using some automatic population
options.

1.2.1Building inventory

1.2.1.1manual mode

Step

Detail

note

When
configuring a host,enter details in the host
inventory
tab

Such as the type of device, serial
number, location, responsible person, etc - data that will populate inventory
information.

If a URL is included in host inventory
information and it starts with 'http' or 'https', it will result in a
clickable link in the Inventory section.

1.2.1.2automatic mode?

Step

Detail

note

the Host inventory tab must be set to
Automatic

Then you can configure host items to
populate any host inventory field with their value, indicating the
destination field with the respective attribute (called Item will populate host inventory field) in item configuration.

Items that are especially useful for
automated inventory data collection:

system.hw.chassis[full|type|vendor|model|serial]
- default is [full], root permissions needed

system.hw.cpu[all|cpunum,full|maxfreq|vendor|model|curfreq]
- default is [all,full]

system.hw.devices[pci|usb] - default is
[pci]

system.hw.macaddr[interface,short|full] -
default is [all,full], interface is regexp

system.sw.arch

system.sw.os[name|short|full] - default
is [name]

system.sw.packages[package,manager,short|full]
- default is [all,all,full], package is regexp

1.2.1.3Inventory mode selection

Inventory mode can be selected in the host
configuration form.

Step

Detail

note

AdministrationGeneral Other.

Inventory mode by default for new hosts
is selected based on the Default host inventory mode setting in
Administration → General → Other.

For hosts added by network discovery or
auto registration actions, it is possible to define a Set host inventory mode
operation selecting manual or automatic mode. This operation overrides the
Default host inventory mode setting

1.2.1.4Inventory overview

Step

Detail

note

In InventoryHosts you can see all hosts that have inventory information.

Clicking on the host name will reveal the
inventory details in a form.

.

zabbix系列之五——安装后配置一的更多相关文章

  1. zabbix系列之六——安装后配置二Items

    https://www.zabbix.com/documentation/3.4/manual/config/items/itemtypes/snmp 1Items 1.1creating items ...

  2. zabbix系列之七——安装后配置二Userparameters

    1User parameters(用户自定义参数) 1.1配置 描述 详细 备注 简介 1执行zabbix中未预定义的agent check时使用 配置 1)    zabbix agent的配置文件 ...

  3. zabbix系列之八——安装后配置三Triggers

    1Triggers(触发器) 描述 详细 备注 术语描述 1)触发器是评估监控项采集的数据的逻辑表达式,代表了当前系统状态. 2)触发器可定义一个什么数据是可接受的阈值,因此,如果接收的数据超过了可接 ...

  4. FreeBSD从零开始---安装后配置(一)

    一.安装后配置   上次我们说到FreeBSD的安装,这次我们说FreeBSD安装后的配置和简单优化方法.   安装完BSD只是服务器提供服务这条万里长征路的开始,还需要一些基本的设定和优化.不过实际 ...

  5. 【zabbix系列】安装与加入host

    測试环境 Ubuntu 14.04.1 LTS [服务端安装] 关于安装官方提供了非常具体的安装方法,包含各平台的源代码及包安装.关于其它版本号Linux请參考 https://www.zabbix. ...

  6. FreeBSD从零开始---安装后配置(二)

    系统优化及安全设置   上次说了FreeBSD基本的软件安装和配置,接下来会说系统的详细配置和安全性设置   一.系统优化设置   1.网络相关设置   网卡和IP地址设置: 如果在安装时没有设置IP ...

  7. CentOS7安装后配置MariaDB

    安装后,优先推荐先对安全设置进行配置,键入命令 sudo mysql_secure_installation 键入当前密码,当前没有,直接回车,之后跟随提示会问几个问题:设置 root 密码? / 移 ...

  8. 软件安装配置笔记(三)——ArcGIS系列产品安装与配置(补档)(附数据库连接及数据导入)

    在前两篇安装配置笔记之后,就忘记把其他安装配置笔记迁移过来了,真是失误失误!趁现在其他文档需要赶紧补上. 目录: 一.ArcMap 二.ArcMap连接数据库并导入数据 三.Arcgis Pro 四. ...

  9. Centos 7最小化安装后配置

    关闭SELINUX vi /etc/sysconfig/selinux SELINUX=disabled :wq 配置网卡(最小化安装后ifconfig无法使用),该配置的前提是采用 NAT模式 vi ...

随机推荐

  1. 第5章—构建Spring Web应用程序—关于spring中的validate注解后台校验的解析

    关于spring中的validate注解后台校验的解析 在后台开发过程中,对参数的校验成为开发环境不可缺少的一个环节.比如参数不能为null,email那么必须符合email的格式,如果手动进行if判 ...

  2. NiftyDialogEffects-多种弹出效果的对话框

    感觉系统自带的对话框弹出太生硬?那就试试NiftyDialogEffects吧,类似于(Nifty Modal Window Effects),效果是模仿里面实现的 ScreenShot  .  .  ...

  3. Javac语法糖之其它

    1.变长参数 class VarialbeArgumentsDemo { public static void doWork(int... a) {//可变参数 } public static voi ...

  4. 国内maven仓库地址资源汇总

    国内maven仓库地址:阿里云maven仓库,网易163maven仓库,以及其他maven仓库地址. 国内下载maven一般速度都很慢,下载需要很久时间.这里汇总了一些国内的镜像资源 附带pom文件中 ...

  5. Go 提高性能的特性

    1.值的高效处理和存储,允许创建紧凑的数据结构,避免不必要的填充字节.紧凑的数据结构能更好地利用缓存.更好的缓存利用率可带来更好的性能. 2.函数的调用有开销,减少函数调用开销的解决方案是内联.简单的 ...

  6. WPF中触发器(Trigger、DataTrigger)使用动画最简单的方式EnterActions和ExitsActions

    1.当鼠标移入后执行某个动画: <Style TargetType="{x:Type StackPanel}"> <Setter Property="R ...

  7. SpringMVC源码阅读:异常解析器

    1.前言 SpringMVC是目前J2EE平台的主流Web框架,不熟悉的园友可以看SpringMVC源码阅读入门,它交代了SpringMVC的基础知识和源码阅读的技巧 本文将通过源码(基于Spring ...

  8. CentOS7.2配置Hadoop2.6.5

    Hadoop配置文件 /etc/profile 配置Java和Hadoop环境 export JAVA_HOME=/usr/lib/jvm/java-1.8.0-openjdk export CLAS ...

  9. Java中的数据验证

    原文链接:https://www.cuba-platform.com/blog/2018-10-09/945 翻译:CUBA China CUBA-Platform 官网 : https://www. ...

  10. cmd下命令提示符下杀进程主要有三种方法

    https://blog.csdn.net/sunboy2718/article/details/30056787 1.用taskkill命令 1.taskkill /im 进程名称 示例:用task ...