Take control of your professional growth and elevate your monitoring game
English
Free
Zabbix 101: Introduction to Open-Source Monitoring
Learn the basics of open-source, monitoring, observability, and Zabbix. It’s designed to help you quickly gain confidence in using Zabbix by explaining its key components and providing insight into the tool’s full potential.
There are several ways to get Zabbix up and running in your environment. Choose the method that best suits your needs—whether it’s a traditional installation or a deployment in the cloud.
Monitoring has many dimensions — from data collection and problem detection to visualizing the health of your infrastructure and beyond. Explore these aspects and discover the value a robust monitoring solution can bring to your organization (48m)
From UserParameters and script-based items to Zabbix Agent 2 plugins, Zabbix offers several powerful ways to extend its native monitoring and data processing capabilities. Explore the different methods for extending Zabbix functionality (40m)
Explore concepts of Zabbix as an Enterprise level, open source monitoring and observability solution and get more familiar with it’s key functionality and architecture (43m)
The course provides an in-depth overview of Zabbix API functionality and covers a variety of use cases — from sending simple JSON-RPC requests to developing complex scripts using the Python API wrapper.
Transforming and Extracting Data with Zabbix Pre-processing
The course covers how to extract and transform information from different sources without using external tools or scripts. Every pre-processing step is explained in detail with examples.
The course covers SNMP polling, configuring Zabbix for SNMP traps, and optimizing SNMP data collection for enterprise-level hardware by utilizing the SNMP bulk data collection features.
Designed for users with knowledge about Zabbix components who want to understand security options on an expert level, this course will show how to protect Zabbix internal communications and secure sensitive information like user credentials and encryption keys.