The Red Hat Ecosystem Catalog is the official source for discovering and learning more about the Red Hat Ecosystem of both Red Hat and certified third-party products and services.
We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.
Zabbix is an enterprise-class open source distributed monitoring solution.
Zabbix is software that monitors numerous parameters of a network and the health and integrity of servers. Zabbix uses a flexible notification mechanism that allows users to configure e-mail based alerts for virtually any event. This allows a fast reaction to server problems. Zabbix offers excellent reporting and data visualisation features based on the stored data. This makes Zabbix ideal for capacity planning.
For more information and related downloads for Zabbix components, please visit https://zabbix.com.
The image is used to receive SNMP traps, store them to a log file and provide access to Zabbix to collected SNMP trap messsages.
Images are updated when new releases are published.
Start a Zabbix snmptraps container as follows:
podman run --name some-zabbix-snmptraps -p 162:1162/udp -d registry.connect.redhat.com/zabbix/zabbix-snmptraps-54:tag
Where some-zabbix-snmptraps is the name you want to assign to your container and tag is the tag specifying the version you want. See the list above for relevant tags, or look at the full list of tags.
podman run --name some-zabbix-server --link some-zabbix-snmptraps:zabbix-snmptraps --volumes-from some-zabbix-snmptraps -d registry.connect.redhat.com/zabbix/zabbix-server-54:tag
The docker exec command allows you to run commands inside a Docker container. The following command line will give you a bash shell inside your zabbix-snmptraps container:
$ podman exec -ti some-zabbix-snmptraps /bin/bash
The Zabbix snmptraps log is available through Docker's container log:
$ podman logs some-zabbix-snmptraps
The volume contains log file snmptraps.log named with received SNMP traps.
Documentation for this image is stored in the snmptraps/ directory of the zabbix/zabbix-docker GitHub repo. Be sure to familiarize yourself with the repository's README.md file before attempting a pull request.
If you have any problems with or questions about this image, please contact us through a GitHub issue.
The following information was extracted from the containerfile and other sources.
Summary | Zabbix SNMP traps receiver |
Description | Zabbix SNMP traps receiver |
Provider | Zabbix Sia |
Maintainer | alexey.pustovalov@zabbix.com |
The following information was extracted from the containerfile and other sources.
Repository name | zabbix/zabbix-snmptraps-54 |
Image version | 5.4 |
Architecture | amd64 |
Exposed ports | ["1162/UDP"] |
User | 1997 |
Use the following instructions to get images from a Red Hat container registry using registry service account tokens. You will need to create a registry service account to use prior to completing any of the following tasks.
First, you will need to add a reference to the appropriate secret and repository to your Kubernetes pod configuration via an imagePullSecrets field.
Then, use the following from the command line or from the OpenShift Dashboard GUI interface.
Use the following command(s) from a system with podman installed
Use the following command(s) from a system with docker service installed and running
Use the following instructions to get images from a Red Hat container registry using your Red Hat login.
For best practices, it is recommended to use registry tokens when pulling content for OpenShift deployments.
Use the following command(s) from a system with podman installed
Use the following command(s) from a system with docker service installed and running