Book Image

Zabbix: Enterprise Network Montioring Made Easy

By : Rihards Olups, Patrik Uytterhoeven, Andrea Dalle Vacche
Book Image

Zabbix: Enterprise Network Montioring Made Easy

By: Rihards Olups, Patrik Uytterhoeven, Andrea Dalle Vacche

Overview of this book

Nowadays, monitoring systems play a crucial role in any IT environment. They are extensively used to not only measure your system’s performance, but also to forecast capacity issues. This is where Zabbix, one of the most popular monitoring solutions for networks and applications, comes into the picture. With an efficient monitoring system in place, you’ll be able to foresee when your infrastructure runs under capacity and react accordingly. Due to the critical role a monitoring system plays, it is fundamental to implement it in the best way from its initial setup. This avoids misleading, confusing, or, even worse, false alarms that can disrupt an efficient and healthy IT department. This course is for administrators who are looking for an end-to-end monitoring solution. It will get you accustomed with the powerful monitoring solution, starting with installation and explaining the fundamentals of Zabbix. Moving on, we explore the complex functionalities of Zabbix in the form of enticing recipes. These recipes will help you to gain control of your infrastructure. You will be able to organize your data in the form of graphs and charts along with building intelligent triggers for monitoring your network proactively. Toward the end, you will gain expertise in monitoring your networks and applications using Zabbix. This Learning Path combines some of the best that Packt has to offer in one complete, curated package. It includes content from the following Packt products: Zabbix Network Monitoring-Second Edition Zabbix Cookbook Mastering Zabbix-Second Edition
Table of Contents (51 chapters)
Zabbix: Enterprise Network Montioring Made Easy
Zabbix: Enterprise Network Montioring Made Easy
Credits
Preface
6
Detecting Problems with Triggers
7
Acting upon Monitored Conditions
Bibliography
Index

Exploring configuration file parameters


Let's conclude this chapter by digging into the configuration files of the Zabbix agent and server and examining each parameter in them. We'll start with the agent configuration file and discuss the ways in which common parameters apply to other daemons. We will skip the proxy configuration file, as the common parameters will be discussed by then, and the proxy-specific parameters were discussed in Chapter 19, Using Proxies to Monitor Remote Locations. We will also skip all the parameters that start with TLS, as those are related to Zabbix daemon traffic encryption, and we discussed that in Chapter 20, Encrypting Daemon Traffic.

We will look at the parameters in the order they appear in in the default example configuration files—no other meaning should be derived from the ordering here.

While reading the following descriptions, it is suggested to have the corresponding configuration file open. It will allow you to verify that the parameters are the same...