Skip to content

Commit 0b45d5a

Browse files
authored
Merge pull request #168 from xenadmin/patch-4
feat(proxy_conf): Reworked jinja Template for Zabbix Proxy 6.2
2 parents 534742b + 58f847d commit 0b45d5a

File tree

1 file changed

+44
-3
lines changed

1 file changed

+44
-3
lines changed

zabbix/files/default/etc/zabbix/zabbix_proxy.conf.jinja

Lines changed: 44 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@
3939
# Server=
4040
{% if settings.get('server', defaults.get('server', False)) %}Server={{ settings.get('server', defaults.server) }}{% endif %}
4141

42+
{% if zabbix.version_repo|float <= 6.0 -%}
4243
### Option: ServerPort
4344
# Port of Zabbix trapper on Zabbix server.
4445
# For a proxy in the passive mode this parameter will be ignored.
@@ -48,6 +49,7 @@
4849
# Default:
4950
# ServerPort=10051
5051
{% if settings.get('serverport', defaults.get('serverport', False)) %}ServerPort={{ settings.get('serverport', defaults.serverport) }}{% endif %}
52+
{% endif %}
5153

5254
### Option: Hostname
5355
# Unique, case sensitive Proxy name. Make sure the Proxy name is known to the server!
@@ -304,7 +306,7 @@
304306
# Mandatory: no
305307
# Range: 1-3600*24*7
306308
# Default:
307-
# ConfigFrequency=3600
309+
# ConfigFrequency=300
308310
{% if settings.get('configfrequency', defaults.get('configfrequency', False)) %}ConfigFrequency={{ settings.get('configfrequency', defaults.configfrequency) }}{% endif %}
309311

310312
### Option: DataSenderFrequency
@@ -1050,13 +1052,26 @@ LoadModule={{ loadmodule }}
10501052
# DBTLSCipher13=
10511053
{% if settings.get('dbtlscipher13', defaults.get('dbtlscipher13', False)) %}DBTLSCipher13={{ settings.get('dbtlscipher13', defaults.dbtlscipher13) }}{% endif %}
10521054

1055+
{% if zabbix.version_repo|float >= 6.2 -%}
1056+
### Option: Vault
1057+
# Specifies vault:
1058+
# HashiCorp - HashiCorp KV Secrets Engine - Version 2
1059+
# CyberArk - CyberArk Central Credential Provider
1060+
#
1061+
# Mandatory: no
1062+
# Default:
1063+
# Vault=HashiCorp
1064+
{% if settings.get('vault', defaults.get('vault', False)) %}Vault={{ settings.get('vault', defaults.vault) }}{% endif %}
1065+
{% endif %}
1066+
10531067
{% if zabbix.version_repo|float >= 6.0 -%}
10541068
### Option: VaultToken
10551069
# Vault authentication token that should have been generated exclusively for Zabbix proxy with read only permission to path
10561070
# specified in optional VaultDBPath configuration parameter.
10571071
# It is an error if VaultToken and VAULT_TOKEN environment variable are defined at the same time.
10581072
#
10591073
# Mandatory: no
1074+
# (yes, if Vault is explicitly set to HashiCorp)
10601075
# Default:
10611076
# VaultToken=
10621077
{% if settings.get('vaulttoken', defaults.get('vaulttoken', False)) %}VaultToken={{ settings.get('vaulttoken', defaults.vaulttoken) }}{% endif %}
@@ -1070,8 +1085,13 @@ LoadModule={{ loadmodule }}
10701085
{% if settings.get('vaulturl', defaults.get('vaulturl', False)) %}VaultURL={{ settings.get('vaulturl', defaults.vaulturl) }}{% endif %}
10711086

10721087
### Option: VaultDBPath
1073-
# Vault path from where credentials for database will be retrieved by keys 'password' and 'username'.
1074-
# Example: secret/zabbix/database
1088+
# Vault path or query depending on the Vault from where credentials for database will be retrieved by keys.
1089+
# Keys used for HashiCorp are 'password' and 'username'.
1090+
# Example path:
1091+
# secret/zabbix/database
1092+
# Keys used for CyberArk are 'Content' and 'UserName'.
1093+
# Example query:
1094+
# AppID=zabbix_server&Query=Safe=passwordSafe;Object=zabbix_proxy_database
10751095
# This option can only be used if DBUser and DBPassword are not specified.
10761096
#
10771097
# Mandatory: no
@@ -1080,6 +1100,27 @@ LoadModule={{ loadmodule }}
10801100
{% if settings.get('vaultdbpath', defaults.get('vaultdbpath', False)) %}VaultDBPath={{ settings.get('vaultdbpath', defaults.vaultdbpath) }}{% endif %}
10811101
{% endif %}
10821102

1103+
{% if zabbix.version_repo|float >= 6.2 -%}
1104+
### Option: VaultTLSCertFile
1105+
# Name of the SSL certificate file used for client authentication. The certificate file must be in PEM1 format.
1106+
# If the certificate file contains also the private key, leave the SSL key file field empty. The directory
1107+
# containing this file is specified by configuration parameter SSLCertLocation.
1108+
#
1109+
# Mandatory: no
1110+
# Default:
1111+
# VaultTLSCertFile=
1112+
{% if settings.get('vaulttlscertfile', defaults.get('vaulttlscertfile', False)) %}VaultTLSCertFile={{ settings.get('vaulttlscertfile', defaults.vaulttlscertfile) }}{% endif %}
1113+
1114+
### Option: VaultTLSKeyFile
1115+
# Name of the SSL private key file used for client authentication. The private key file must be in PEM1 format.
1116+
# The directory containing this file is specified by configuration parameter SSLKeyLocation.
1117+
#
1118+
# Mandatory: no
1119+
# Default:
1120+
# VaultTLSKeyFile=
1121+
{% if settings.get('vaulttlskeyfile', defaults.get('vaulttlskeyfile', False)) %}VaultTLSKeyFile={{ settings.get('vaulttlskeyfile', defaults.vaulttlskeyfile) }}{% endif %}
1122+
{% endif %}
1123+
10831124
####### For advanced users - TCP-related fine-tuning parameters #######
10841125

10851126
## Option: ListenBacklog

0 commit comments

Comments
 (0)