Book Image

Zabbix 4 Network Monitoring - Third Edition

By : Patrik Uytterhoeven, Rihards Olups
Book Image

Zabbix 4 Network Monitoring - Third Edition

By: Patrik Uytterhoeven, Rihards Olups

Overview of this book

Zabbix 4 Network Monitoring is the perfect starting point for monitoring the performance of your network devices and applications with Zabbix. Even if you’ve never used a monitoring solution before, this book will get you up and running quickly. You’ll learn to monitor more sophisticated operations with ease and soon feel in complete control of your network, ready to meet any challenges you might face. Starting with the installation, you will discover the new features in Zabbix 4.0. You will then get to grips with native Zabbix agents and Simple Network Management Protocol (SNMP) devices. You will also explore Zabbix's integrated functionality for monitoring Java application servers and VMware. This book also covers notifications, permission management, system maintenance, and troubleshooting, so you can be confident that every potential challenge and task is under your control. If you're working with larger environments, you'll also be able to find out more about distributed data collection using Zabbix proxies. Once you're confident and ready to put these concepts into practice, you will understand how to optimize and improve performance. Troubleshooting network issues is vital for anyone working with Zabbix, so the book also helps you work through any technical snags and glitches you might face. By the end of this book, you will have learned more advanced techniques to fine-tune your system and make sure it is in a healthy state.
Table of Contents (25 chapters)

Authentication options

In the scenario properties, there was also a tab that we didn't use: Authentication. Check it out here:

For HTTP authentication, Zabbix currently supports two options—Basic and NTLM. Digest authentication is not supported at this time, as you can see:

Choosing one of the HTTP authentication methods will provide input fields for a username and password.

All the other options are SSL/TLS-related. The checkboxes allow us to validate the server certificate—the SSL verify peer option checks the certificate validity, and SSL verify host additionally checks that the server hostname matches the Common Name or the Subject Alternate Name in the certificate. The certificate authority is validated against the system default. The location of the CA certificates can also be overridden by the SSLCALocation parameter in the server configuration file...