https://www.zabbix.com/documentation/3.4/manual/appliance

Configuration

1Hosts and host groups

Overview:

1Typical Zabbix hosts are the devices you wish to monitor (servers, workstations, switches, etc).

2creating hosts is one of the first monitoring tasks in zabbix.

3hosts are organized into host groups.

1.1configuring a host

1.1.1create a host

Step

Detail

note

Go to: ConfigurationHosts

Click on Create host

Enter parameters of the host in the form

You can also use the Clone and Full clone buttons in the form of an existing host to create a new host.

Note:

1Clicking on Clone will retain all host parameters and template linkage (keeping all entities from those templates)

2Full clone will additionally retain directly attached entities (applications, items, triggers, graphs, low-level discovery rules and web scenarios).

3 When a host is cloned, it will retain all template entities as they are originally on the template. Any changes to those entities made on the existing host level (such as changed item interval, modified regular expression or added prototypes to the low-level discovery rule) will not be cloned to the new host; instead they will be as on the template.

1.1.2configuration

1.1.2.1Host tab

Parameter

Description

Host name

Enter a unique host name. Alphanumerics, spaces, dots, dashes and underscores are allowed.
Note: With Zabbix agent running on the
host you are configuring, the agent configuration file parameterHostname must have the same value as the host
name entered here. The name in the parameter is needed in the processing of active checks.

Visible
name

If
you set this name, it will be the one visible in lists, maps, etc. This
attribute has UTF-8 support.

Groups

Select
host groups the host belongs to. A host must belong to at least one host
group.

New
host group

A
new group can be created and linked to the host. Ignored, if empty.

Interfaces

Several
host interface types are supported for a host: AgentSNMPJMX and IPMI.
To add a new interface, click on Add in
the Interfaces block and enter IP/DNSConnect
to
 and Port
info.
Note: Interfaces that are used in any items
cannot be removed and link Remove is greyed out for them.
Use bulk requests option
for SNMP interfaces allows to enable/disable bulk processing of SNMP requests per interface.

IP
address

Host
IP address (optional).

DNS name

Host DNS name (optional).

Connect
to

Clicking
the respective button will tell Zabbix server what to use to retrieve data
from agents:
IP - Connect to the host IP address
(recommended)
DNS - Connect to the host DNS name

Port

TCP/UDP
port number. Default values are: 10050 for Zabbix agent, 161 for SNMP agent,
12345 for JMX and 623 for IPMI.

Default

Check
the radio button to set the default interface.

Description

Enter
the host description.

Monitored
by proxy

The
host can be monitored either by Zabbix server or one of Zabbix proxies:
(no proxy) - host is monitored by Zabbix server
Proxy name - host is monitored by Zabbix proxy
“Proxy name”

Enabled

Mark
the checkbox to make the host active, ready to be monitored. If unchecked,
the host is not active, thus not monitored.

1.1.2.2 Templates tab

1)Link
templates

Step

Detail

note

start
typing in the Link new templates
field until a list of matching templates appear.

The Templates
tab allows you to link templates to the host. All entities (items, triggers,
graphs and applications) will be inherited from the template.

Scroll down to select.

click on Add.

2)unlink
template

method

Detail

note

Method
1

Unlink - unlink the template, but
preserve its items, triggers and graphs

Method 2

nlink and clear - unlink the template and
remove all its items, triggers and graphs

1.1.2.3 IPMI tab

Parameter

description

note

Authentication algorithm

Select the authentication algorithm.

Privilege level

Select the privilege level.

Username

User name for authentication.

Password

Password for authentication.

1.1.2.4 Macros tab

1)The Macros tab allows you to define
host-level user macros.

2) You may also view here template-level
and global macros if you select the Inherited and host macros option. That is
where all defined user macros for the host are displayed with the value they
resolve to as well as their origin

3) For convenience, links to respective
templates and global macro configuration are provided. It is also possible to
edit a template/global macro on the host level, effectively creating a copy of
the macro on the host.

1.1.2.5 Host inventory tab

1)allows you to manually enter inventory
information for the host.

2) You can also select to enable Automatic
inventory population, or disable inventory population for this host.

1.1.2.6 Encryption tab

allows you to require encrypted connections
with the host.

Parameter

description

note

Connections to host

How Zabbix server or proxy connects to
Zabbix agent on a host: no encryption (default), using PSK (pre-shared key)
or certificate.

Connections to host

Connections from host

Select what type of connections are
allowed from the host (i.e. from Zabbix agent and Zabbix sender). Several
connection types can be selected at the same time (useful for testing and
switching to other connection type). Default is “No encryption”.

Connections from host

Issuer

Allowed issuer of certificate.
Certificate is first validated with CA (certificate authority). If it is
valid, signed by the CA, then the Issuer field can be used to further
restrict allowed CA. This field is intended to be used if your Zabbix
installation uses certificates from multiple CAs. If this field is empty then
any CA is accepted.

Issuer

Subject

Allowed subject of certificate.
Certificate is first validated with CA. If it is valid, signed by the CA,
then the Subject field can be used to allow only one value of Subject string.
If this field is empty then any valid certificate signed by the configured CA
is accepted.

Subject

PSK identity

Pre-shared key identity string.

PSK identity

PSK

Pre-shared key (hex-string). Maximum
length: 512 hex-digits (256-byte PSK) if Zabbix uses GnuTLS or OpenSSL
library, 64 hex-digits (32-byte PSK) if Zabbix uses mbed TLS (PolarSSL)
library. Example:
1f87b595725ac58dd977beef14b97461a7c1045b9a1c963065002c5473194952

PSK

1.1.3configuring host group

Step

Detail

note

Go to:
ConfigurationHost groups

Click on Create Group in the upper right corner of the screen

Enter parameters of the group in the form

Parameter

description

note

Group name

Enter a unique
host group name.
To create a nested host group, use the '/' forward slash separator, for
exampleEurope/Latvia/Riga/Zabbix servers. You can create this group even if
none of the three parent host groups (Europe/Latvia/Riga) exist. In this case
creating these parent host groups is up to the user; they will not be created
automatically.
Leading and trailing slashes, several slashes in a row are not allowed.
Escaping of '/' is not supported.
Nested representation of host groups is supported since Zabbix 3.2.0.

Hosts

Select hosts,
members of the group. A host group may have zero, one or more hosts.

Apply
permissions to all subgroups

Mark this
checkbox and click on Update to apply the same level of
permissions to all nested host groups. For user groups that may have had
differing permissionsassigned to
nested host groups, the permission level of the parent host group will be
enforced on the nested groups.
This is a one-time option that is not saved in the database. It is available
to Zabbix Super Admin users only and only when editing an existing host
group.
This option is supported since Zabbix 3.4.0.

Permissions
to nested host groups

1)     
When creating a child host
group to an existing parent host group, user group permissions to the child are
inherited from the parent (for example, when creating Riga/Zabbix servers if
Riga already exists)

2)     
When creating a parent host group
to an existing child host group, no permissions to the parent are set (for
example, when creating Riga if Riga/Zabbix servers already exists)

1.2Inventory

Overview:

1)You can keep the inventory of networked
devices in Zabbix.

2) However, you will not see any data there
initially and it is not where you enter data.

3) Building inventory data is done manually
when configuring a host or automatically by using some automatic population
options.

1.2.1Building inventory

1.2.1.1manual mode

Step

Detail

note

When
configuring a host,enter details in the host
inventory
tab

Such as the type of device, serial
number, location, responsible person, etc - data that will populate inventory
information.

If a URL is included in host inventory
information and it starts with 'http' or 'https', it will result in a
clickable link in the Inventory section.

1.2.1.2automatic mode?

Step

Detail

note

the Host inventory tab must be set to
Automatic

Then you can configure host items to
populate any host inventory field with their value, indicating the
destination field with the respective attribute (called Item will populate host inventory field) in item configuration.

Items that are especially useful for
automated inventory data collection:

system.hw.chassis[full|type|vendor|model|serial]
- default is [full], root permissions needed

system.hw.cpu[all|cpunum,full|maxfreq|vendor|model|curfreq]
- default is [all,full]

system.hw.devices[pci|usb] - default is
[pci]

system.hw.macaddr[interface,short|full] -
default is [all,full], interface is regexp

system.sw.arch

system.sw.os[name|short|full] - default
is [name]

system.sw.packages[package,manager,short|full]
- default is [all,all,full], package is regexp

1.2.1.3Inventory mode selection

Inventory mode can be selected in the host
configuration form.

Step

Detail

note

AdministrationGeneral Other.

Inventory mode by default for new hosts
is selected based on the Default host inventory mode setting in
Administration → General → Other.

For hosts added by network discovery or
auto registration actions, it is possible to define a Set host inventory mode
operation selecting manual or automatic mode. This operation overrides the
Default host inventory mode setting

1.2.1.4Inventory overview

Step

Detail

note

In InventoryHosts you can see all hosts that have inventory information.

Clicking on the host name will reveal the
inventory details in a form.

.

zabbix系列之五——安装后配置一的更多相关文章

  1. zabbix系列之六——安装后配置二Items

    https://www.zabbix.com/documentation/3.4/manual/config/items/itemtypes/snmp 1Items 1.1creating items ...

  2. zabbix系列之七——安装后配置二Userparameters

    1User parameters(用户自定义参数) 1.1配置 描述 详细 备注 简介 1执行zabbix中未预定义的agent check时使用 配置 1)    zabbix agent的配置文件 ...

  3. zabbix系列之八——安装后配置三Triggers

    1Triggers(触发器) 描述 详细 备注 术语描述 1)触发器是评估监控项采集的数据的逻辑表达式,代表了当前系统状态. 2)触发器可定义一个什么数据是可接受的阈值,因此,如果接收的数据超过了可接 ...

  4. FreeBSD从零开始---安装后配置(一)

    一.安装后配置   上次我们说到FreeBSD的安装,这次我们说FreeBSD安装后的配置和简单优化方法.   安装完BSD只是服务器提供服务这条万里长征路的开始,还需要一些基本的设定和优化.不过实际 ...

  5. 【zabbix系列】安装与加入host

    測试环境 Ubuntu 14.04.1 LTS [服务端安装] 关于安装官方提供了非常具体的安装方法,包含各平台的源代码及包安装.关于其它版本号Linux请參考 https://www.zabbix. ...

  6. FreeBSD从零开始---安装后配置(二)

    系统优化及安全设置   上次说了FreeBSD基本的软件安装和配置,接下来会说系统的详细配置和安全性设置   一.系统优化设置   1.网络相关设置   网卡和IP地址设置: 如果在安装时没有设置IP ...

  7. CentOS7安装后配置MariaDB

    安装后,优先推荐先对安全设置进行配置,键入命令 sudo mysql_secure_installation 键入当前密码,当前没有,直接回车,之后跟随提示会问几个问题:设置 root 密码? / 移 ...

  8. 软件安装配置笔记(三)——ArcGIS系列产品安装与配置(补档)(附数据库连接及数据导入)

    在前两篇安装配置笔记之后,就忘记把其他安装配置笔记迁移过来了,真是失误失误!趁现在其他文档需要赶紧补上. 目录: 一.ArcMap 二.ArcMap连接数据库并导入数据 三.Arcgis Pro 四. ...

  9. Centos 7最小化安装后配置

    关闭SELINUX vi /etc/sysconfig/selinux SELINUX=disabled :wq 配置网卡(最小化安装后ifconfig无法使用),该配置的前提是采用 NAT模式 vi ...

随机推荐

  1. Java之集合(五)LinkedList

    转载请注明源出处:http://www.cnblogs.com/lighten/p/7298017.html 1.前言 Java中另一个常见的list就是本章将要讲的LinkedList.ArrayL ...

  2. 搭建hadoop_之 创建3个虚拟机配置好网络

    (创建3个虚拟机,1个作为主服务器,二个作为从节点)   一.安装虚拟机 Windwos:VMware Workstation Pro MAC:VMware Fusion 安装:     ** 创建空 ...

  3. 分析org.rpgpoet.Music.wizards.length

    例子如下: package bazola; public class Gabriel { static int n = org.rpgpoet.Music.wizards.length; } pack ...

  4. C#的SubString(int start,int end);

    C#的SubString(); 例子: string str = "i am a girl"; string temp = str.Substring(2,2);//从索引2开始, ...

  5. jQuery操纵cookie(原生javascript处理cookie)

    jQuery也是可以操作cookie的 1.首先下载jQuery.js 以及 jquery.cookie.js 这两个文件 2.安装(其实就是引用) <html>       <he ...

  6. redis集群与分片(1)-redis服务器集群、客户端分片

    下面是来自知乎大神的一段说明,个人觉得非常清晰,就收藏了. 为什么集群? 通常,为了提高网站响应速度,总是把热点数据保存在内存中而不是直接从后端数据库中读取.Redis是一个很好的Cache工具.大型 ...

  7. 我所了解的Hibernate注解

    一,首先需要导入支持注解开发的jar包: hibernate-annotations.jar hibernate-commons-annotations.jar (Hibernate中支持注解开发的j ...

  8. Java基础教程(12)--深入理解类

    一.方法的返回值   当我们在程序中调用方法时,虚拟机将会跳转到对应的方法中去执行.当以下几种情况发生时,虚拟机将会回到调用方法的语句并继续向下执行: 执行完方法中所有的语句: 遇到return语句: ...

  9. 啰哩吧嗦式讲解在windows 家庭版安装docker

    1.docker是什么,为什么要使用docker Docker 是一个开源的应用容器引擎,让开发者可以打包他们的应用以及依赖包到一个可移植的容器中, 然后发布到任何流行的 Linux 机器上,也可以实 ...

  10. 二十、curator recipes之NodeCache

    简介 Curator的NodeCache允许你监听一个节点,当节点数据更改或者节点被删除的时候将会触发监听. 官方文档:http://curator.apache.org/curator-recipe ...