Let's conclude this chapter by digging into the configuration files of the Zabbix agent and server and examining each parameter in them. We'll start with the agent configuration file and discuss the ways in which common parameters apply to other daemons. We will skip the proxy configuration file, as the common parameters will be discussed by then, and the proxy-specific parameters were discussed in Chapter 19, Using Proxies to Monitor Remote Locations. We will also skip all the parameters that start with TLS, as those are related to Zabbix daemon traffic encryption, and we discussed that in Chapter 20, Encrypting Daemon Traffic.
We will look at the parameters in the order they appear in in the default example configuration files—no other meaning should be derived from the ordering here.
While reading the following descriptions, it is suggested to have the corresponding configuration file open. It will allow you to verify that the parameters are the same...