Learn how Zabbix can help you to build a security monitoring solution to detect various IT infrastructure vulnerabilities like weak configurations, open ports, unsecured web-pages, physical intrusions, corrupted files, and many other issues.

Learn how Zabbix can help you to build a security monitoring solution to detect various IT infrastructure vulnerabilities like weak configurations, open ports, unsecured web-pages, physical intrusions, corrupted files, and many other issues.
Sometimes it is required to monitor not only a performance of database, but also the data inside it. Zabbix has native functionality to query the database, visualize and process the data.
Watch the video now.
Zabbix 4.4 introduces a new type of agent, zabbix_agent2, which offers a wide range of new capabilities and advanced monitoring functions.
What are the different ways you can use Zabbix preprocessing and why you should consider implementing it in your environment? Let’s take a brief look at how Zabbix preprocessing has evolved and the technical nuances of transforming and storing your preprocessed data.
Processing of XML documents were never as easy as now. Xpath preprocessing is available as a native functionality without any third party scripts or modules. Write your xpath query and use it against your XML document to extract desired value.
Integrate Zabbix with Grafana in just a few steps. Visualize collected data not only in native Zabbix frontend, but also in Grafana.
Watch the video now.
Zabbix premier event of the year – Zabbix Summit 2019 was held on October 11-12. Hundreds of Zabbix users and fans came to Riga from almost 50 countries to spend a few days together, learn and get inspired by each other.
Monitoring does not have to be about past and present. By utilizing trend prediction functions in Zabbix it is possible to analyze already collected data and predict the value in future. In that way, it is possible to get notified about the problem before it even happened.
User macros with context can be used to accomplish more flexible thresholds in trigger expressions. Different thresholds may be defined on user macro level and then used in trigger constants depending on the discovered context. In this post we are going to check simple example, how to configure it in real life scenario.
The Bodleian Library is one of the oldest libraries in Europe, and in Britain, it is second in size only to the British Library. First opened to scholars in 1602, it incorporates an earlier library built by the University in the 15th century to house books donated by Humfrey, Duke of Gloucester. Since 1602 it has expanded, slowly at first but with increasing momentum over the last 150 years, to keep pace with the ever-growing accumulation of books, papers, and other materials, but the core of the old buildings has remained intact. Together, the Bodleian Libraries hold over 13 million printed items.