https://www.zabbix.com/documentation/3.4/manual/appliance

Configuration

1Hosts and host groups

Overview:

1Typical Zabbix hosts are the devices you wish to monitor (servers, workstations, switches, etc).

2creating hosts is one of the first monitoring tasks in zabbix.

3hosts are organized into host groups.

1.1configuring a host

1.1.1create a host

Step

Detail

note

Go to: ConfigurationHosts

Click on Create host

Enter parameters of the host in the form

You can also use the Clone and Full clone buttons in the form of an existing host to create a new host.

Note:

1Clicking on Clone will retain all host parameters and template linkage (keeping all entities from those templates)

2Full clone will additionally retain directly attached entities (applications, items, triggers, graphs, low-level discovery rules and web scenarios).

3 When a host is cloned, it will retain all template entities as they are originally on the template. Any changes to those entities made on the existing host level (such as changed item interval, modified regular expression or added prototypes to the low-level discovery rule) will not be cloned to the new host; instead they will be as on the template.

1.1.2configuration

1.1.2.1Host tab

Parameter

Description

Host name

Enter a unique host name. Alphanumerics, spaces, dots, dashes and underscores are allowed.
Note: With Zabbix agent running on the
host you are configuring, the agent configuration file parameterHostname must have the same value as the host
name entered here. The name in the parameter is needed in the processing of active checks.

Visible
name

If
you set this name, it will be the one visible in lists, maps, etc. This
attribute has UTF-8 support.

Groups

Select
host groups the host belongs to. A host must belong to at least one host
group.

New
host group

A
new group can be created and linked to the host. Ignored, if empty.

Interfaces

Several
host interface types are supported for a host: AgentSNMPJMX and IPMI.
To add a new interface, click on Add in
the Interfaces block and enter IP/DNSConnect
to
 and Port
info.
Note: Interfaces that are used in any items
cannot be removed and link Remove is greyed out for them.
Use bulk requests option
for SNMP interfaces allows to enable/disable bulk processing of SNMP requests per interface.

IP
address

Host
IP address (optional).

DNS name

Host DNS name (optional).

Connect
to

Clicking
the respective button will tell Zabbix server what to use to retrieve data
from agents:
IP - Connect to the host IP address
(recommended)
DNS - Connect to the host DNS name

Port

TCP/UDP
port number. Default values are: 10050 for Zabbix agent, 161 for SNMP agent,
12345 for JMX and 623 for IPMI.

Default

Check
the radio button to set the default interface.

Description

Enter
the host description.

Monitored
by proxy

The
host can be monitored either by Zabbix server or one of Zabbix proxies:
(no proxy) - host is monitored by Zabbix server
Proxy name - host is monitored by Zabbix proxy
“Proxy name”

Enabled

Mark
the checkbox to make the host active, ready to be monitored. If unchecked,
the host is not active, thus not monitored.

1.1.2.2 Templates tab

1)Link
templates

Step

Detail

note

start
typing in the Link new templates
field until a list of matching templates appear.

The Templates
tab allows you to link templates to the host. All entities (items, triggers,
graphs and applications) will be inherited from the template.

Scroll down to select.

click on Add.

2)unlink
template

method

Detail

note

Method
1

Unlink - unlink the template, but
preserve its items, triggers and graphs

Method 2

nlink and clear - unlink the template and
remove all its items, triggers and graphs

1.1.2.3 IPMI tab

Parameter

description

note

Authentication algorithm

Select the authentication algorithm.

Privilege level

Select the privilege level.

Username

User name for authentication.

Password

Password for authentication.

1.1.2.4 Macros tab

1)The Macros tab allows you to define
host-level user macros.

2) You may also view here template-level
and global macros if you select the Inherited and host macros option. That is
where all defined user macros for the host are displayed with the value they
resolve to as well as their origin

3) For convenience, links to respective
templates and global macro configuration are provided. It is also possible to
edit a template/global macro on the host level, effectively creating a copy of
the macro on the host.

1.1.2.5 Host inventory tab

1)allows you to manually enter inventory
information for the host.

2) You can also select to enable Automatic
inventory population, or disable inventory population for this host.

1.1.2.6 Encryption tab

allows you to require encrypted connections
with the host.

Parameter

description

note

Connections to host

How Zabbix server or proxy connects to
Zabbix agent on a host: no encryption (default), using PSK (pre-shared key)
or certificate.

Connections to host

Connections from host

Select what type of connections are
allowed from the host (i.e. from Zabbix agent and Zabbix sender). Several
connection types can be selected at the same time (useful for testing and
switching to other connection type). Default is “No encryption”.

Connections from host

Issuer

Allowed issuer of certificate.
Certificate is first validated with CA (certificate authority). If it is
valid, signed by the CA, then the Issuer field can be used to further
restrict allowed CA. This field is intended to be used if your Zabbix
installation uses certificates from multiple CAs. If this field is empty then
any CA is accepted.

Issuer

Subject

Allowed subject of certificate.
Certificate is first validated with CA. If it is valid, signed by the CA,
then the Subject field can be used to allow only one value of Subject string.
If this field is empty then any valid certificate signed by the configured CA
is accepted.

Subject

PSK identity

Pre-shared key identity string.

PSK identity

PSK

Pre-shared key (hex-string). Maximum
length: 512 hex-digits (256-byte PSK) if Zabbix uses GnuTLS or OpenSSL
library, 64 hex-digits (32-byte PSK) if Zabbix uses mbed TLS (PolarSSL)
library. Example:
1f87b595725ac58dd977beef14b97461a7c1045b9a1c963065002c5473194952

PSK

1.1.3configuring host group

Step

Detail

note

Go to:
ConfigurationHost groups

Click on Create Group in the upper right corner of the screen

Enter parameters of the group in the form

Parameter

description

note

Group name

Enter a unique
host group name.
To create a nested host group, use the '/' forward slash separator, for
exampleEurope/Latvia/Riga/Zabbix servers. You can create this group even if
none of the three parent host groups (Europe/Latvia/Riga) exist. In this case
creating these parent host groups is up to the user; they will not be created
automatically.
Leading and trailing slashes, several slashes in a row are not allowed.
Escaping of '/' is not supported.
Nested representation of host groups is supported since Zabbix 3.2.0.

Hosts

Select hosts,
members of the group. A host group may have zero, one or more hosts.

Apply
permissions to all subgroups

Mark this
checkbox and click on Update to apply the same level of
permissions to all nested host groups. For user groups that may have had
differing permissionsassigned to
nested host groups, the permission level of the parent host group will be
enforced on the nested groups.
This is a one-time option that is not saved in the database. It is available
to Zabbix Super Admin users only and only when editing an existing host
group.
This option is supported since Zabbix 3.4.0.

Permissions
to nested host groups

1)     
When creating a child host
group to an existing parent host group, user group permissions to the child are
inherited from the parent (for example, when creating Riga/Zabbix servers if
Riga already exists)

2)     
When creating a parent host group
to an existing child host group, no permissions to the parent are set (for
example, when creating Riga if Riga/Zabbix servers already exists)

1.2Inventory

Overview:

1)You can keep the inventory of networked
devices in Zabbix.

2) However, you will not see any data there
initially and it is not where you enter data.

3) Building inventory data is done manually
when configuring a host or automatically by using some automatic population
options.

1.2.1Building inventory

1.2.1.1manual mode

Step

Detail

note

When
configuring a host,enter details in the host
inventory
tab

Such as the type of device, serial
number, location, responsible person, etc - data that will populate inventory
information.

If a URL is included in host inventory
information and it starts with 'http' or 'https', it will result in a
clickable link in the Inventory section.

1.2.1.2automatic mode?

Step

Detail

note

the Host inventory tab must be set to
Automatic

Then you can configure host items to
populate any host inventory field with their value, indicating the
destination field with the respective attribute (called Item will populate host inventory field) in item configuration.

Items that are especially useful for
automated inventory data collection:

system.hw.chassis[full|type|vendor|model|serial]
- default is [full], root permissions needed

system.hw.cpu[all|cpunum,full|maxfreq|vendor|model|curfreq]
- default is [all,full]

system.hw.devices[pci|usb] - default is
[pci]

system.hw.macaddr[interface,short|full] -
default is [all,full], interface is regexp

system.sw.arch

system.sw.os[name|short|full] - default
is [name]

system.sw.packages[package,manager,short|full]
- default is [all,all,full], package is regexp

1.2.1.3Inventory mode selection

Inventory mode can be selected in the host
configuration form.

Step

Detail

note

AdministrationGeneral Other.

Inventory mode by default for new hosts
is selected based on the Default host inventory mode setting in
Administration → General → Other.

For hosts added by network discovery or
auto registration actions, it is possible to define a Set host inventory mode
operation selecting manual or automatic mode. This operation overrides the
Default host inventory mode setting

1.2.1.4Inventory overview

Step

Detail

note

In InventoryHosts you can see all hosts that have inventory information.

Clicking on the host name will reveal the
inventory details in a form.

.

zabbix系列之五——安装后配置一的更多相关文章

  1. zabbix系列之六——安装后配置二Items

    https://www.zabbix.com/documentation/3.4/manual/config/items/itemtypes/snmp 1Items 1.1creating items ...

  2. zabbix系列之七——安装后配置二Userparameters

    1User parameters(用户自定义参数) 1.1配置 描述 详细 备注 简介 1执行zabbix中未预定义的agent check时使用 配置 1)    zabbix agent的配置文件 ...

  3. zabbix系列之八——安装后配置三Triggers

    1Triggers(触发器) 描述 详细 备注 术语描述 1)触发器是评估监控项采集的数据的逻辑表达式,代表了当前系统状态. 2)触发器可定义一个什么数据是可接受的阈值,因此,如果接收的数据超过了可接 ...

  4. FreeBSD从零开始---安装后配置(一)

    一.安装后配置   上次我们说到FreeBSD的安装,这次我们说FreeBSD安装后的配置和简单优化方法.   安装完BSD只是服务器提供服务这条万里长征路的开始,还需要一些基本的设定和优化.不过实际 ...

  5. 【zabbix系列】安装与加入host

    測试环境 Ubuntu 14.04.1 LTS [服务端安装] 关于安装官方提供了非常具体的安装方法,包含各平台的源代码及包安装.关于其它版本号Linux请參考 https://www.zabbix. ...

  6. FreeBSD从零开始---安装后配置(二)

    系统优化及安全设置   上次说了FreeBSD基本的软件安装和配置,接下来会说系统的详细配置和安全性设置   一.系统优化设置   1.网络相关设置   网卡和IP地址设置: 如果在安装时没有设置IP ...

  7. CentOS7安装后配置MariaDB

    安装后,优先推荐先对安全设置进行配置,键入命令 sudo mysql_secure_installation 键入当前密码,当前没有,直接回车,之后跟随提示会问几个问题:设置 root 密码? / 移 ...

  8. 软件安装配置笔记(三)——ArcGIS系列产品安装与配置(补档)(附数据库连接及数据导入)

    在前两篇安装配置笔记之后,就忘记把其他安装配置笔记迁移过来了,真是失误失误!趁现在其他文档需要赶紧补上. 目录: 一.ArcMap 二.ArcMap连接数据库并导入数据 三.Arcgis Pro 四. ...

  9. Centos 7最小化安装后配置

    关闭SELINUX vi /etc/sysconfig/selinux SELINUX=disabled :wq 配置网卡(最小化安装后ifconfig无法使用),该配置的前提是采用 NAT模式 vi ...

随机推荐

  1. Office Visio 201*安装详细步骤并激活

    不多说直接上干货! 初步了解:  Visio的百度百科:http://baike.baidu.com/link?url=tNv_gqhhVKcurpP8kvh4ylkknc5JQLIm6bGmQVxi ...

  2. Centos7下安装mysql5.6需要注意的点

    1.自带的Mariadb和mysql冲突需要卸载. 2.原先安装过的mysql没有卸载干净会导致安装失败. 3.mysql文件夹权限需要给够,my.cnf也是一样. 4.安装过程中如果出现的其他问题很 ...

  3. docker “no space left on device”问题定位解决

    在paas环境上使用docker加载镜像的时候出现了如下问题 第一反应应该是存储镜像的路径磁盘满了 docker info查看docker的根路径,可以看到为/opt/docker: 查看/opt/d ...

  4. ActiveMQ消息持久化到Mysql数据库

    1.把连接MySQL数据库的jar文件,放到ActiveMQ的lib目录下 2.修改ActiveMQ的conf目录下的activemq.xml文件,修改数据持久化的方式2.1 修改原来的kahadb的 ...

  5. Go语言学习笔记十二: 范围(Range)

    Go语言学习笔记十二: 范围(Range) rang这个关键字主要用来遍历数组,切片,通道或Map.在数组和切片中返回索引值,在Map中返回key. 这个特别像python的方式.不过写法上比较怪异使 ...

  6. mybatis异常:Error instantiating class com.psc.bean.User with invalid types () or values ().

    Error instantiating class com.psc.bean.User with invalid types () or values (). 是由于bean类没有无参构建方法,添加一 ...

  7. centos7的防火墙配置

    centos7 不在使用iptables作为防火墙, 而是使用firewalld规则, 好吃是支持动态更新, 不需要重启服务, 第二个就是加入了zone概念. 所以和centos6在防火墙配置上有很大 ...

  8. 糗事之 -- 用ssh公钥实现免密码登录

    前言:工作原因,每天都会登录好多次服务器,每次都是ssh root@192.168..... 然后输入密码,来来回回输几次真是很烦啊. 问题:怎么可以在每次ssh连接服务器时不用输入密码,直接登录? ...

  9. Java多态-如何理解父类引用指向子类对象

    java多态,如何理解父类引用指向子类对象 要理解多态性,首先要知道什么是“向上转型”. 我定义了一个子类Cat,它继承了Animal类,那么后者就是前者是父类.我可以通过   Cat c = new ...

  10. hdu 3085

    Nightmare Ⅱ Time Limit: 2000/1000 MS (Java/Others)    Memory Limit: 32768/32768 K (Java/Others)Total ...