Zabbix 6.2 Manualsome sensitive information from Zabbix in CyberArk Vault CV2. Similarly to storing secrets in HashiCorp Vault, introduced in Zabbix 5.2, CyberArk Vault can be used for: • user macro values 8 • database database access credentials Zabbix provides read-only access to the secrets in vault. See also: CyberArk configuration Secure password hashing In Zabbix 5.0 the password hashing algorithm was changed from no target is specified, reload configuration for all proxies secrets_reload Reload secrets from Vault. service_cache_reloadReload the service manager cache. snmp_cache_reloadReload SNMP cache, clear0 码力 | 1689 页 | 22.82 MB | 1 年前3
Zabbix 6.4 ManualRemote commands Templates New templates are available: • Acronis Cyber Protect Cloud by HTTP • HashiCorp Nomad by HTTP • MantisBT by HTTP You can get these templates: • In Data collection → Templates no target is specified, reload configuration for all proxies secrets_reload Reload secrets from Vault. service_cache_reloadReload the service manager cache. snmp_cache_reloadReload SNMP cache, clear set to HashiCorp Vault or CyberArk Vault, additional parameters will become available: • for HashiCorp Vault: Vault API endpoint, secret path and authentication token; • for CyberArk Vault: Vault API endpoint0 码力 | 1885 页 | 29.12 MB | 1 年前3
Zabbix 7.0 Manualno target is specified, reload configuration for all proxies secrets_reload Reload secrets from Vault. service_cache_reloadReload the service manager cache. snmp_cache_reloadReload SNMP cache, clear set to HashiCorp Vault or CyberArk Vault, additional parameters will become available: • for HashiCorp Vault: Vault API endpoint, secret path and authentication token; • for CyberArk Vault: Vault API endpoint endpoint, secret query string and certificates. Upon marking Vault certificates checkbox, two new fields for specifying paths to SSL certificate file and SSL key file will appear. Settings Entering0 码力 | 1949 页 | 31.91 MB | 1 年前3
Zabbix 7.0 中文手册另请参阅升级说明。 在配置文件中添加了 Vault 前缀参数 配置文件 zabbix_server.conf 和 zabbix_proxy.conf 已补充了一个新的可选参数 Vault Prefix;zabbix.conf.php 已补充了选项 $DB['VAULT_PREFIX'],并且已相应地更新了 setup.php。 因此,CyberArk 和HashiCorp的 vault 路径不再是硬编码的,以便允许使用非标准路径进行 路径不再是硬编码的,以便允许使用非标准路径进行 vault 部署。 Agent2 配置 缓冲区大小 Zabbix agent 2 的BufferSize配置参数的默认值已从 100 增加到 1000。 允许空值 现在,Zabbix agent 2 上与插件相关的配置参数允许为空值。 Proxy 内存缓存 Zabbix proxy 已经支持内存缓存。内存缓存允许将新的数据(监控值、网络发现、主机自动注册)存储在缓存中,并在不访问数据库的情 target>] 重新加载 proxy 配置缓存。 target - 逗号分隔的 proxy 名称的列表。 如果没有指定,则重新加载所有 proxy 的配置 secrets_reload 从 Vault 重新加载机密。 service_cache_reload重新加载服务管理器缓存。 snmp_cache_reload重新加载 SNMP 缓存,清除所有主机的 SNMP 属性 (引擎时间、引擎启动、引擎0 码力 | 1951 页 | 33.43 MB | 1 年前3
The Path to GitOpsexternal secret management systems such as AWS Secrets Manager [7.3], HashiCorp Vault [7.4], Google Secrets Manager [7.5], and Azure Key Vault [7.6] using a plug-in model. The External Secrets controller reads reads information from external APIs (for example, HashiCorp Vault) and injects the values from the external system into Kubernetes as a secret. This process works by providing the controller with an 5] https://cloud.google.com/secret-manager [7.6] https://azure.microsoft.com/en-us/services/key-vault/ The Path to GitOps | 41 Chapter 8 Other Considerations In this book, I have taken you on a step-by-step0 码力 | 45 页 | 1.09 MB | 1 年前3
Zabbix 6.0 ManualNew templates are available: • CockroachDB by HTTP • Envoy Proxy by HTTP • HashiCorp Consul Cluster by HTTP • HashiCorp Consul Node by HTTP See setup instructions for HTTP templates. You can get these Remote commands Templates New templates are available: • Acronis Cyber Protect Cloud by HTTP • HashiCorp Nomad by HTTP • MantisBT by HTTP You can get these templates: • In Configuration → Templates suffixes are supported, e.g. 10s, 1m. 35 Option Description Target secrets_reload Reload secrets from Vault. service_cache_reloadReload the service manager cache. snmp_cache_reloadReload SNMP cache, clear0 码力 | 1681 页 | 23.19 MB | 1 年前3
Zabbix 5.2 Manualsecretly in HashiCorp Vault KV Secrets Engine - Version 2. Secrets can be saved for: • user macro values • database access credentials Zabbix provides read-only access to the secrets in Vault. See also: filled with the resolved macro value, however, if the value (or part of the value) is a secret or Vault macro, the field will be empty and will need to be filled manually. To be able to tell that a secret out-of-the-box monitoring: • Apache ActiveMQ by JMX - see setup instructions for JMX templates; • HashiCorp Vault by HTTP - see setup instructions for HTTP templates; • Microsoft Exchange Server 2016 by Zabbix0 码力 | 1738 页 | 18.98 MB | 1 年前3
Zabbix 6.0 ManualZabbix 6.0.5 新功能 模板 新的模板已经可以使用: • CockroachDB by HTTP • Envoy Proxy by HTTP • HashiCorp Consul Cluster by HTTP • HashiCorp Consul Node by HTTP 有关设置说明,请参阅HTTP 模板. 你可以使用如下方式获取到新的模板: • 在新安装的 配置 → 模板中; ha_status 获 得) ha_set_failover_delay=delay 设置高可用性 (HA) 故障转移延迟。 支持时间后缀,例如 10 秒,1 分钟。 secrets_reload 从 Vault 重新加载机密。 service_cache_reload 重新加载服务管理器缓存。 snmp_cache_reload 重新加载 SNMP 缓存,清除所有主机的 SNMP 属性(引擎 时间、引擎启动、引擎 选项,则需要在出现的信息栏中填写有关configuring the TLS connection的配置信息(该功能仅限数 据库类型为 MySQL 或 PostgreSQL)。若选择 HashiCorp Vault 选项来进行凭据存储,请在附加的信息栏中输入相关信息,用以说明 Vault API 端点、隐藏路径以及身份验证令牌: 配置 对 Zabbix 服务器进行命名的配置为可选配置。该配置一旦提交,设定的服务器名称就会显示在网页的菜单栏和页面标题中。0 码力 | 1741 页 | 22.78 MB | 1 年前3
Zabbix 5.4 Manualstatistics lld - LLD manager statistics locks - list of mutexes secrets_reload Reload secrets from Vault. snmp_cache_reload Reload SNMP cache, clear the SNMP properties (engine time, engine boots, engine in the form (MySQL or PostgreSQL only). If HashiCorp Vault option is selected for storing credentials, additional fields are available for specifying the Vault API endpoint, secret path and authentication macros as a name-value pairs. Note that macro values can be kept as plain text, secret text, or Vault secret. Adding a description is also supported. You may also view here macros from linked templates0 码力 | 1825 页 | 20.03 MB | 1 年前3
Zabbix 5.4 中文手册item JavaScript HTTP requests; - preprocessing JavaScript HTTP requests; - connections to the Vault SSHKeyLocation no Location of public and private keys for SSH checks and actions SSLCertLocation 1-3600 45 After how many seconds of unreachability treat a host as unavailable. VaultDBPath no Vault path from where credentials for database will be retrieved by keys ’password’ and ’username’. and DBPassword are not specified. This parameter is supported since Zabbix 5.2.0. VaultToken no Vault authentication token that should have been generated exclusively for Zabbix proxy with read-only0 码力 | 2339 页 | 19.57 MB | 1 年前3
共 25 条
- 1
- 2
- 3













