zabbix系列之五——安装后配置一
https://www.zabbix.com/documentation/3.4/manual/appliance
Configuration
1Hosts and host groups
Overview:
1Typical Zabbix hosts are the devices you wish to monitor (servers, workstations, switches, etc).
2creating hosts is one of the first monitoring tasks in zabbix.
3hosts are organized into host groups.
1.1configuring a host
1.1.1create a host
|
Step |
Detail |
note |
|
Go to: Configuration → Hosts |
||
|
Click on Create host |
||
|
Enter parameters of the host in the form |
You can also use the Clone and Full clone buttons in the form of an existing host to create a new host. |
Note:
1Clicking on Clone will retain all host parameters and template linkage (keeping all entities from those templates)
2Full clone will additionally retain directly attached entities (applications, items, triggers, graphs, low-level discovery rules and web scenarios).
3 When a host is cloned, it will retain all template entities as they are originally on the template. Any changes to those entities made on the existing host level (such as changed item interval, modified regular expression or added prototypes to the low-level discovery rule) will not be cloned to the new host; instead they will be as on the template.
1.1.2configuration
1.1.2.1Host tab
|
Parameter |
Description |
|
Host name |
Enter a unique host name. Alphanumerics, spaces, dots, dashes and underscores are allowed. |
|
Visible |
If |
|
Groups |
Select |
|
New |
A |
|
Interfaces |
Several |
|
IP |
Host |
|
DNS name |
Host DNS name (optional). |
|
Connect |
Clicking |
|
Port |
TCP/UDP |
|
Default |
Check |
|
Description |
Enter |
|
Monitored |
The |
|
Enabled |
Mark |
1.1.2.2 Templates tab
1)Link
templates
|
Step |
Detail |
note |
|
start |
The Templates |
|
|
Scroll down to select. |
||
|
click on Add. |
2)unlink
template
|
method |
Detail |
note |
|
Method |
Unlink - unlink the template, but |
|
|
Method 2 |
nlink and clear - unlink the template and |
1.1.2.3 IPMI tab
|
Parameter |
description |
note |
|
Authentication algorithm |
Select the authentication algorithm. |
|
|
Privilege level |
Select the privilege level. |
|
|
Username |
User name for authentication. |
|
|
Password |
Password for authentication. |
1.1.2.4 Macros tab
1)The Macros tab allows you to define
host-level user macros.
2) You may also view here template-level
and global macros if you select the Inherited and host macros option. That is
where all defined user macros for the host are displayed with the value they
resolve to as well as their origin
3) For convenience, links to respective
templates and global macro configuration are provided. It is also possible to
edit a template/global macro on the host level, effectively creating a copy of
the macro on the host.
1.1.2.5 Host inventory tab
1)allows you to manually enter inventory
information for the host.
2) You can also select to enable Automatic
inventory population, or disable inventory population for this host.
1.1.2.6 Encryption tab
allows you to require encrypted connections
with the host.
|
Parameter |
description |
note |
|
Connections to host |
How Zabbix server or proxy connects to |
Connections to host |
|
Connections from host |
Select what type of connections are |
Connections from host |
|
Issuer |
Allowed issuer of certificate. |
Issuer |
|
Subject |
Allowed subject of certificate. |
Subject |
|
PSK identity |
Pre-shared key identity string. |
PSK identity |
|
PSK |
Pre-shared key (hex-string). Maximum |
PSK |
1.1.3configuring host group
|
Step |
Detail |
note |
|
Go to: |
||
|
Click on Create Group in the upper right corner of the screen |
||
|
Enter parameters of the group in the form |
|
Parameter |
description |
note |
|
Group name |
Enter a unique |
|
|
Hosts |
Select hosts, |
|
|
Apply |
Mark this |
Permissions
to nested host groups
1)
When creating a child host
group to an existing parent host group, user group permissions to the child are
inherited from the parent (for example, when creating Riga/Zabbix servers if
Riga already exists)
2)
When creating a parent host group
to an existing child host group, no permissions to the parent are set (for
example, when creating Riga if Riga/Zabbix servers already exists)
1.2Inventory
Overview:
1)You can keep the inventory of networked
devices in Zabbix.
2) However, you will not see any data there
initially and it is not where you enter data.
3) Building inventory data is done manually
when configuring a host or automatically by using some automatic population
options.
1.2.1Building inventory
1.2.1.1manual mode
|
Step |
Detail |
note |
|
When |
Such as the type of device, serial |
If a URL is included in host inventory |
1.2.1.2automatic mode?
|
Step |
Detail |
note |
|
the Host inventory tab must be set to |
||
|
Then you can configure host items to |
||
|
Items that are especially useful for system.hw.chassis[full|type|vendor|model|serial] system.hw.cpu[all|cpunum,full|maxfreq|vendor|model|curfreq] system.hw.devices[pci|usb] - default is system.hw.macaddr[interface,short|full] - system.sw.arch system.sw.os[name|short|full] - default system.sw.packages[package,manager,short|full] |
1.2.1.3Inventory mode selection
Inventory mode can be selected in the host
configuration form.
|
Step |
Detail |
note |
|
Administration → General → Other. |
Inventory mode by default for new hosts |
For hosts added by network discovery or |
1.2.1.4Inventory overview
|
Step |
Detail |
note |
|
In Inventory → Hosts you can see all hosts that have inventory information. |
Clicking on the host name will reveal the |
.
zabbix系列之五——安装后配置一的更多相关文章
- zabbix系列之六——安装后配置二Items
https://www.zabbix.com/documentation/3.4/manual/config/items/itemtypes/snmp 1Items 1.1creating items ...
- zabbix系列之七——安装后配置二Userparameters
1User parameters(用户自定义参数) 1.1配置 描述 详细 备注 简介 1执行zabbix中未预定义的agent check时使用 配置 1) zabbix agent的配置文件 ...
- zabbix系列之八——安装后配置三Triggers
1Triggers(触发器) 描述 详细 备注 术语描述 1)触发器是评估监控项采集的数据的逻辑表达式,代表了当前系统状态. 2)触发器可定义一个什么数据是可接受的阈值,因此,如果接收的数据超过了可接 ...
- FreeBSD从零开始---安装后配置(一)
一.安装后配置 上次我们说到FreeBSD的安装,这次我们说FreeBSD安装后的配置和简单优化方法. 安装完BSD只是服务器提供服务这条万里长征路的开始,还需要一些基本的设定和优化.不过实际 ...
- 【zabbix系列】安装与加入host
測试环境 Ubuntu 14.04.1 LTS [服务端安装] 关于安装官方提供了非常具体的安装方法,包含各平台的源代码及包安装.关于其它版本号Linux请參考 https://www.zabbix. ...
- FreeBSD从零开始---安装后配置(二)
系统优化及安全设置 上次说了FreeBSD基本的软件安装和配置,接下来会说系统的详细配置和安全性设置 一.系统优化设置 1.网络相关设置 网卡和IP地址设置: 如果在安装时没有设置IP ...
- CentOS7安装后配置MariaDB
安装后,优先推荐先对安全设置进行配置,键入命令 sudo mysql_secure_installation 键入当前密码,当前没有,直接回车,之后跟随提示会问几个问题:设置 root 密码? / 移 ...
- 软件安装配置笔记(三)——ArcGIS系列产品安装与配置(补档)(附数据库连接及数据导入)
在前两篇安装配置笔记之后,就忘记把其他安装配置笔记迁移过来了,真是失误失误!趁现在其他文档需要赶紧补上. 目录: 一.ArcMap 二.ArcMap连接数据库并导入数据 三.Arcgis Pro 四. ...
- Centos 7最小化安装后配置
关闭SELINUX vi /etc/sysconfig/selinux SELINUX=disabled :wq 配置网卡(最小化安装后ifconfig无法使用),该配置的前提是采用 NAT模式 vi ...
随机推荐
- Java之集合(五)LinkedList
转载请注明源出处:http://www.cnblogs.com/lighten/p/7298017.html 1.前言 Java中另一个常见的list就是本章将要讲的LinkedList.ArrayL ...
- 搭建hadoop_之 创建3个虚拟机配置好网络
(创建3个虚拟机,1个作为主服务器,二个作为从节点) 一.安装虚拟机 Windwos:VMware Workstation Pro MAC:VMware Fusion 安装: ** 创建空 ...
- 分析org.rpgpoet.Music.wizards.length
例子如下: package bazola; public class Gabriel { static int n = org.rpgpoet.Music.wizards.length; } pack ...
- C#的SubString(int start,int end);
C#的SubString(); 例子: string str = "i am a girl"; string temp = str.Substring(2,2);//从索引2开始, ...
- jQuery操纵cookie(原生javascript处理cookie)
jQuery也是可以操作cookie的 1.首先下载jQuery.js 以及 jquery.cookie.js 这两个文件 2.安装(其实就是引用) <html> <he ...
- redis集群与分片(1)-redis服务器集群、客户端分片
下面是来自知乎大神的一段说明,个人觉得非常清晰,就收藏了. 为什么集群? 通常,为了提高网站响应速度,总是把热点数据保存在内存中而不是直接从后端数据库中读取.Redis是一个很好的Cache工具.大型 ...
- 我所了解的Hibernate注解
一,首先需要导入支持注解开发的jar包: hibernate-annotations.jar hibernate-commons-annotations.jar (Hibernate中支持注解开发的j ...
- Java基础教程(12)--深入理解类
一.方法的返回值 当我们在程序中调用方法时,虚拟机将会跳转到对应的方法中去执行.当以下几种情况发生时,虚拟机将会回到调用方法的语句并继续向下执行: 执行完方法中所有的语句: 遇到return语句: ...
- 啰哩吧嗦式讲解在windows 家庭版安装docker
1.docker是什么,为什么要使用docker Docker 是一个开源的应用容器引擎,让开发者可以打包他们的应用以及依赖包到一个可移植的容器中, 然后发布到任何流行的 Linux 机器上,也可以实 ...
- 二十、curator recipes之NodeCache
简介 Curator的NodeCache允许你监听一个节点,当节点数据更改或者节点被删除的时候将会触发监听. 官方文档:http://curator.apache.org/curator-recipe ...