https://www.zabbix.com/documentation/3.4/manual/appliance

Configuration

1Hosts and host groups

Overview:

1Typical Zabbix hosts are the devices you wish to monitor (servers, workstations, switches, etc).

2creating hosts is one of the first monitoring tasks in zabbix.

3hosts are organized into host groups.

1.1configuring a host

1.1.1create a host

Step

Detail

note

Go to: ConfigurationHosts

Click on Create host

Enter parameters of the host in the form

You can also use the Clone and Full clone buttons in the form of an existing host to create a new host.

Note:

1Clicking on Clone will retain all host parameters and template linkage (keeping all entities from those templates)

2Full clone will additionally retain directly attached entities (applications, items, triggers, graphs, low-level discovery rules and web scenarios).

3 When a host is cloned, it will retain all template entities as they are originally on the template. Any changes to those entities made on the existing host level (such as changed item interval, modified regular expression or added prototypes to the low-level discovery rule) will not be cloned to the new host; instead they will be as on the template.

1.1.2configuration

1.1.2.1Host tab

Parameter

Description

Host name

Enter a unique host name. Alphanumerics, spaces, dots, dashes and underscores are allowed.
Note: With Zabbix agent running on the
host you are configuring, the agent configuration file parameterHostname must have the same value as the host
name entered here. The name in the parameter is needed in the processing of active checks.

Visible
name

If
you set this name, it will be the one visible in lists, maps, etc. This
attribute has UTF-8 support.

Groups

Select
host groups the host belongs to. A host must belong to at least one host
group.

New
host group

A
new group can be created and linked to the host. Ignored, if empty.

Interfaces

Several
host interface types are supported for a host: AgentSNMPJMX and IPMI.
To add a new interface, click on Add in
the Interfaces block and enter IP/DNSConnect
to
 and Port
info.
Note: Interfaces that are used in any items
cannot be removed and link Remove is greyed out for them.
Use bulk requests option
for SNMP interfaces allows to enable/disable bulk processing of SNMP requests per interface.

IP
address

Host
IP address (optional).

DNS name

Host DNS name (optional).

Connect
to

Clicking
the respective button will tell Zabbix server what to use to retrieve data
from agents:
IP - Connect to the host IP address
(recommended)
DNS - Connect to the host DNS name

Port

TCP/UDP
port number. Default values are: 10050 for Zabbix agent, 161 for SNMP agent,
12345 for JMX and 623 for IPMI.

Default

Check
the radio button to set the default interface.

Description

Enter
the host description.

Monitored
by proxy

The
host can be monitored either by Zabbix server or one of Zabbix proxies:
(no proxy) - host is monitored by Zabbix server
Proxy name - host is monitored by Zabbix proxy
“Proxy name”

Enabled

Mark
the checkbox to make the host active, ready to be monitored. If unchecked,
the host is not active, thus not monitored.

1.1.2.2 Templates tab

1)Link
templates

Step

Detail

note

start
typing in the Link new templates
field until a list of matching templates appear.

The Templates
tab allows you to link templates to the host. All entities (items, triggers,
graphs and applications) will be inherited from the template.

Scroll down to select.

click on Add.

2)unlink
template

method

Detail

note

Method
1

Unlink - unlink the template, but
preserve its items, triggers and graphs

Method 2

nlink and clear - unlink the template and
remove all its items, triggers and graphs

1.1.2.3 IPMI tab

Parameter

description

note

Authentication algorithm

Select the authentication algorithm.

Privilege level

Select the privilege level.

Username

User name for authentication.

Password

Password for authentication.

1.1.2.4 Macros tab

1)The Macros tab allows you to define
host-level user macros.

2) You may also view here template-level
and global macros if you select the Inherited and host macros option. That is
where all defined user macros for the host are displayed with the value they
resolve to as well as their origin

3) For convenience, links to respective
templates and global macro configuration are provided. It is also possible to
edit a template/global macro on the host level, effectively creating a copy of
the macro on the host.

1.1.2.5 Host inventory tab

1)allows you to manually enter inventory
information for the host.

2) You can also select to enable Automatic
inventory population, or disable inventory population for this host.

1.1.2.6 Encryption tab

allows you to require encrypted connections
with the host.

Parameter

description

note

Connections to host

How Zabbix server or proxy connects to
Zabbix agent on a host: no encryption (default), using PSK (pre-shared key)
or certificate.

Connections to host

Connections from host

Select what type of connections are
allowed from the host (i.e. from Zabbix agent and Zabbix sender). Several
connection types can be selected at the same time (useful for testing and
switching to other connection type). Default is “No encryption”.

Connections from host

Issuer

Allowed issuer of certificate.
Certificate is first validated with CA (certificate authority). If it is
valid, signed by the CA, then the Issuer field can be used to further
restrict allowed CA. This field is intended to be used if your Zabbix
installation uses certificates from multiple CAs. If this field is empty then
any CA is accepted.

Issuer

Subject

Allowed subject of certificate.
Certificate is first validated with CA. If it is valid, signed by the CA,
then the Subject field can be used to allow only one value of Subject string.
If this field is empty then any valid certificate signed by the configured CA
is accepted.

Subject

PSK identity

Pre-shared key identity string.

PSK identity

PSK

Pre-shared key (hex-string). Maximum
length: 512 hex-digits (256-byte PSK) if Zabbix uses GnuTLS or OpenSSL
library, 64 hex-digits (32-byte PSK) if Zabbix uses mbed TLS (PolarSSL)
library. Example:
1f87b595725ac58dd977beef14b97461a7c1045b9a1c963065002c5473194952

PSK

1.1.3configuring host group

Step

Detail

note

Go to:
ConfigurationHost groups

Click on Create Group in the upper right corner of the screen

Enter parameters of the group in the form

Parameter

description

note

Group name

Enter a unique
host group name.
To create a nested host group, use the '/' forward slash separator, for
exampleEurope/Latvia/Riga/Zabbix servers. You can create this group even if
none of the three parent host groups (Europe/Latvia/Riga) exist. In this case
creating these parent host groups is up to the user; they will not be created
automatically.
Leading and trailing slashes, several slashes in a row are not allowed.
Escaping of '/' is not supported.
Nested representation of host groups is supported since Zabbix 3.2.0.

Hosts

Select hosts,
members of the group. A host group may have zero, one or more hosts.

Apply
permissions to all subgroups

Mark this
checkbox and click on Update to apply the same level of
permissions to all nested host groups. For user groups that may have had
differing permissionsassigned to
nested host groups, the permission level of the parent host group will be
enforced on the nested groups.
This is a one-time option that is not saved in the database. It is available
to Zabbix Super Admin users only and only when editing an existing host
group.
This option is supported since Zabbix 3.4.0.

Permissions
to nested host groups

1)     
When creating a child host
group to an existing parent host group, user group permissions to the child are
inherited from the parent (for example, when creating Riga/Zabbix servers if
Riga already exists)

2)     
When creating a parent host group
to an existing child host group, no permissions to the parent are set (for
example, when creating Riga if Riga/Zabbix servers already exists)

1.2Inventory

Overview:

1)You can keep the inventory of networked
devices in Zabbix.

2) However, you will not see any data there
initially and it is not where you enter data.

3) Building inventory data is done manually
when configuring a host or automatically by using some automatic population
options.

1.2.1Building inventory

1.2.1.1manual mode

Step

Detail

note

When
configuring a host,enter details in the host
inventory
tab

Such as the type of device, serial
number, location, responsible person, etc - data that will populate inventory
information.

If a URL is included in host inventory
information and it starts with 'http' or 'https', it will result in a
clickable link in the Inventory section.

1.2.1.2automatic mode?

Step

Detail

note

the Host inventory tab must be set to
Automatic

Then you can configure host items to
populate any host inventory field with their value, indicating the
destination field with the respective attribute (called Item will populate host inventory field) in item configuration.

Items that are especially useful for
automated inventory data collection:

system.hw.chassis[full|type|vendor|model|serial]
- default is [full], root permissions needed

system.hw.cpu[all|cpunum,full|maxfreq|vendor|model|curfreq]
- default is [all,full]

system.hw.devices[pci|usb] - default is
[pci]

system.hw.macaddr[interface,short|full] -
default is [all,full], interface is regexp

system.sw.arch

system.sw.os[name|short|full] - default
is [name]

system.sw.packages[package,manager,short|full]
- default is [all,all,full], package is regexp

1.2.1.3Inventory mode selection

Inventory mode can be selected in the host
configuration form.

Step

Detail

note

AdministrationGeneral Other.

Inventory mode by default for new hosts
is selected based on the Default host inventory mode setting in
Administration → General → Other.

For hosts added by network discovery or
auto registration actions, it is possible to define a Set host inventory mode
operation selecting manual or automatic mode. This operation overrides the
Default host inventory mode setting

1.2.1.4Inventory overview

Step

Detail

note

In InventoryHosts you can see all hosts that have inventory information.

Clicking on the host name will reveal the
inventory details in a form.

.

zabbix系列之五——安装后配置一的更多相关文章

  1. zabbix系列之六——安装后配置二Items

    https://www.zabbix.com/documentation/3.4/manual/config/items/itemtypes/snmp 1Items 1.1creating items ...

  2. zabbix系列之七——安装后配置二Userparameters

    1User parameters(用户自定义参数) 1.1配置 描述 详细 备注 简介 1执行zabbix中未预定义的agent check时使用 配置 1)    zabbix agent的配置文件 ...

  3. zabbix系列之八——安装后配置三Triggers

    1Triggers(触发器) 描述 详细 备注 术语描述 1)触发器是评估监控项采集的数据的逻辑表达式,代表了当前系统状态. 2)触发器可定义一个什么数据是可接受的阈值,因此,如果接收的数据超过了可接 ...

  4. FreeBSD从零开始---安装后配置(一)

    一.安装后配置   上次我们说到FreeBSD的安装,这次我们说FreeBSD安装后的配置和简单优化方法.   安装完BSD只是服务器提供服务这条万里长征路的开始,还需要一些基本的设定和优化.不过实际 ...

  5. 【zabbix系列】安装与加入host

    測试环境 Ubuntu 14.04.1 LTS [服务端安装] 关于安装官方提供了非常具体的安装方法,包含各平台的源代码及包安装.关于其它版本号Linux请參考 https://www.zabbix. ...

  6. FreeBSD从零开始---安装后配置(二)

    系统优化及安全设置   上次说了FreeBSD基本的软件安装和配置,接下来会说系统的详细配置和安全性设置   一.系统优化设置   1.网络相关设置   网卡和IP地址设置: 如果在安装时没有设置IP ...

  7. CentOS7安装后配置MariaDB

    安装后,优先推荐先对安全设置进行配置,键入命令 sudo mysql_secure_installation 键入当前密码,当前没有,直接回车,之后跟随提示会问几个问题:设置 root 密码? / 移 ...

  8. 软件安装配置笔记(三)——ArcGIS系列产品安装与配置(补档)(附数据库连接及数据导入)

    在前两篇安装配置笔记之后,就忘记把其他安装配置笔记迁移过来了,真是失误失误!趁现在其他文档需要赶紧补上. 目录: 一.ArcMap 二.ArcMap连接数据库并导入数据 三.Arcgis Pro 四. ...

  9. Centos 7最小化安装后配置

    关闭SELINUX vi /etc/sysconfig/selinux SELINUX=disabled :wq 配置网卡(最小化安装后ifconfig无法使用),该配置的前提是采用 NAT模式 vi ...

随机推荐

  1. C/C++ -- Gui编程 -- Qt库的使用 -- 使用图片与动画

    QWidget工程 #include "mywidget.h" #include "ui_mywidget.h" #include <QLabel> ...

  2. 移动端模拟hover

    <!DOCTYPE html><html><head> <meta charset="UTF-8"> <meta name=& ...

  3. IndexDB的基本操作

    1.前端存储的一个数据库. 2.介绍一下基本操作. <!DOCTYPE html> <html> <head> <meta charset="UTF ...

  4. docker容器网络通信原理分析(转)

    概述 自从docker容器出现以来,容器的网络通信就一直是大家关注的焦点,也是生产环境的迫切需求.而容器的网络通信又可以分为两大方面:单主机容器上的相互通信和跨主机的容器相互通信.而本文将分别针对这两 ...

  5. 【设计模式】工厂模式 Factory Pattern

    1)简单工厂(不是模式) 简单工厂只是一种变成习惯,并非23种设计模式之一. 简单工厂提供将实例话那种类型留给运行时判断,而非编译时指定.简单工厂模式就是由一个工厂类根据传入的参数决定创建出哪一个类的 ...

  6. redis实战笔记(4)-第4章 数据安全与性能保障

    本章主要内容 4.1 将数据持久化至硬盘 4.2 将数据复制至其他机器 4.3 处理系统故障 4.4 Redis事务 4.5 非事务型流水线( non-transactional pipeline) ...

  7. 【LeetCode题解】160_相交链表

    目录 160_相交链表 描述 解法一:哈希表 思路 Java 实现 Python 实现 解法二:双指针(推荐) 思路 Java 实现 Python 实现 160_相交链表 描述 编写一个程序,找到两个 ...

  8. msdn 中MethodBase.Invoke 方法 介绍中的坑

    模块开发总结: c#动态调用webservices 来自网络及使用心得. msdn: MethodBase.Invoke 方法 (Object, Object[]) 使用指定的参数调用当前实例所表示的 ...

  9. python队列、线程、进程、协程

    目录: 一.queue 二.线程 基本使用 线程锁 自定义线程池 生产者消费者模型(队列) 三.进程 基本使用 进程锁 进程数据共享 默认数据不共享 queues array Manager.dict ...

  10. Tomcat配置列表显示

    找到tomcat安装的conf文件下的web.xml文件 C:\Program Files\Apache Software Foundation\Tomcat 8.0\conf\web.xml 打开后 ...