3939# Server=
4040{% if settings .get ('server' , defaults .get ('server' , False )) %} Server={{ settings.get('server', defaults.server) }}{% endif %}
4141
42+ {% if zabbix .version_repo |float <= 6.0 -%}
4243### Option: ServerPort
4344# Port of Zabbix trapper on Zabbix server.
4445# For a proxy in the passive mode this parameter will be ignored.
4849# Default:
4950# ServerPort=10051
5051{% if settings .get ('serverport' , defaults .get ('serverport' , False )) %} ServerPort={{ settings.get('serverport', defaults.serverport) }}{% endif %}
52+ {% endif %}
5153
5254### Option: Hostname
5355# Unique, case sensitive Proxy name. Make sure the Proxy name is known to the server!
304306# Mandatory: no
305307# Range: 1-3600*24*7
306308# Default:
307- # ConfigFrequency=3600
309+ # ConfigFrequency=300
308310{% if settings .get ('configfrequency' , defaults .get ('configfrequency' , False )) %} ConfigFrequency={{ settings.get('configfrequency', defaults.configfrequency) }}{% endif %}
309311
310312### Option: DataSenderFrequency
@@ -1050,13 +1052,26 @@ LoadModule={{ loadmodule }}
10501052# DBTLSCipher13=
10511053{% if settings .get ('dbtlscipher13' , defaults .get ('dbtlscipher13' , False )) %} DBTLSCipher13={{ settings.get('dbtlscipher13', defaults.dbtlscipher13) }}{% endif %}
10521054
1055+ {% if zabbix .version_repo |float >= 6.2 -%}
1056+ ### Option: Vault
1057+ # Specifies vault:
1058+ # HashiCorp - HashiCorp KV Secrets Engine - Version 2
1059+ # CyberArk - CyberArk Central Credential Provider
1060+ #
1061+ # Mandatory: no
1062+ # Default:
1063+ # Vault=HashiCorp
1064+ {% if settings .get ('vault' , defaults .get ('vault' , False )) %} Vault={{ settings.get('vault', defaults.vault) }}{% endif %}
1065+ {% endif %}
1066+
10531067{% if zabbix .version_repo |float >= 6.0 -%}
10541068### Option: VaultToken
10551069# Vault authentication token that should have been generated exclusively for Zabbix proxy with read only permission to path
10561070# specified in optional VaultDBPath configuration parameter.
10571071# It is an error if VaultToken and VAULT_TOKEN environment variable are defined at the same time.
10581072#
10591073# Mandatory: no
1074+ # (yes, if Vault is explicitly set to HashiCorp)
10601075# Default:
10611076# VaultToken=
10621077{% if settings .get ('vaulttoken' , defaults .get ('vaulttoken' , False )) %} VaultToken={{ settings.get('vaulttoken', defaults.vaulttoken) }}{% endif %}
@@ -1070,8 +1085,13 @@ LoadModule={{ loadmodule }}
10701085{% if settings .get ('vaulturl' , defaults .get ('vaulturl' , False )) %} VaultURL={{ settings.get('vaulturl', defaults.vaulturl) }}{% endif %}
10711086
10721087### Option: VaultDBPath
1073- # Vault path from where credentials for database will be retrieved by keys 'password' and 'username'.
1074- # Example: secret/zabbix/database
1088+ # Vault path or query depending on the Vault from where credentials for database will be retrieved by keys.
1089+ # Keys used for HashiCorp are 'password' and 'username'.
1090+ # Example path:
1091+ # secret/zabbix/database
1092+ # Keys used for CyberArk are 'Content' and 'UserName'.
1093+ # Example query:
1094+ # AppID=zabbix_server&Query=Safe=passwordSafe;Object=zabbix_proxy_database
10751095# This option can only be used if DBUser and DBPassword are not specified.
10761096#
10771097# Mandatory: no
@@ -1080,6 +1100,27 @@ LoadModule={{ loadmodule }}
10801100{% if settings .get ('vaultdbpath' , defaults .get ('vaultdbpath' , False )) %} VaultDBPath={{ settings.get('vaultdbpath', defaults.vaultdbpath) }}{% endif %}
10811101{% endif %}
10821102
1103+ {% if zabbix .version_repo |float >= 6.2 -%}
1104+ ### Option: VaultTLSCertFile
1105+ # Name of the SSL certificate file used for client authentication. The certificate file must be in PEM1 format.
1106+ # If the certificate file contains also the private key, leave the SSL key file field empty. The directory
1107+ # containing this file is specified by configuration parameter SSLCertLocation.
1108+ #
1109+ # Mandatory: no
1110+ # Default:
1111+ # VaultTLSCertFile=
1112+ {% if settings .get ('vaulttlscertfile' , defaults .get ('vaulttlscertfile' , False )) %} VaultTLSCertFile={{ settings.get('vaulttlscertfile', defaults.vaulttlscertfile) }}{% endif %}
1113+
1114+ ### Option: VaultTLSKeyFile
1115+ # Name of the SSL private key file used for client authentication. The private key file must be in PEM1 format.
1116+ # The directory containing this file is specified by configuration parameter SSLKeyLocation.
1117+ #
1118+ # Mandatory: no
1119+ # Default:
1120+ # VaultTLSKeyFile=
1121+ {% if settings .get ('vaulttlskeyfile' , defaults .get ('vaulttlskeyfile' , False )) %} VaultTLSKeyFile={{ settings.get('vaulttlskeyfile', defaults.vaulttlskeyfile) }}{% endif %}
1122+ {% endif %}
1123+
10831124####### For advanced users - TCP-related fine-tuning parameters #######
10841125
10851126## Option: ListenBacklog
0 commit comments