mirror of
https://github.com/zabbix/zabbix-docker.git
synced 2025-01-30 17:28:42 +01:00
Added CyberArk vault
This commit is contained in:
parent
2d2ef681c2
commit
700558ecd7
@ -361,13 +361,19 @@ update_zbx_config() {
|
||||
update_config_var $ZBX_CONFIG "DBSchema" "${DB_SERVER_SCHEMA}"
|
||||
update_config_var $ZBX_CONFIG "DBPort" "${DB_SERVER_PORT}"
|
||||
|
||||
if [ -n "${VAULT_TOKEN}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
if [ -n "${ZBX_VAULTDBPATH}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
update_config_var $ZBX_CONFIG "Vault" "${ZBX_VAULT}"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath" "${ZBX_VAULTDBPATH}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile" "${ZBX_VAULTTLSCERTFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile" "${ZBX_VAULTTLSKEYFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultURL" "${ZBX_VAULTURL}"
|
||||
update_config_var $ZBX_CONFIG "DBUser"
|
||||
update_config_var $ZBX_CONFIG "DBPassword"
|
||||
else
|
||||
update_config_var $ZBX_CONFIG "Vault"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile"
|
||||
update_config_var $ZBX_CONFIG "VaultURL"
|
||||
update_config_var $ZBX_CONFIG "DBUser" "${DB_SERVER_ZBX_USER}"
|
||||
update_config_var $ZBX_CONFIG "DBPassword" "${DB_SERVER_ZBX_PASS}"
|
||||
|
@ -358,13 +358,19 @@ update_zbx_config() {
|
||||
update_config_var $ZBX_CONFIG "DBSchema" "${DB_SERVER_SCHEMA}"
|
||||
update_config_var $ZBX_CONFIG "DBPort" "${DB_SERVER_PORT}"
|
||||
|
||||
if [ -n "${VAULT_TOKEN}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
if [ -n "${ZBX_VAULTDBPATH}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
update_config_var $ZBX_CONFIG "Vault" "${ZBX_VAULT}"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath" "${ZBX_VAULTDBPATH}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile" "${ZBX_VAULTTLSCERTFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile" "${ZBX_VAULTTLSKEYFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultURL" "${ZBX_VAULTURL}"
|
||||
update_config_var $ZBX_CONFIG "DBUser"
|
||||
update_config_var $ZBX_CONFIG "DBPassword"
|
||||
else
|
||||
update_config_var $ZBX_CONFIG "Vault"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile"
|
||||
update_config_var $ZBX_CONFIG "VaultURL"
|
||||
update_config_var $ZBX_CONFIG "DBUser" "${DB_SERVER_ZBX_USER}"
|
||||
update_config_var $ZBX_CONFIG "DBPassword" "${DB_SERVER_ZBX_PASS}"
|
||||
|
@ -358,13 +358,19 @@ update_zbx_config() {
|
||||
update_config_var $ZBX_CONFIG "DBSchema" "${DB_SERVER_SCHEMA}"
|
||||
update_config_var $ZBX_CONFIG "DBPort" "${DB_SERVER_PORT}"
|
||||
|
||||
if [ -n "${VAULT_TOKEN}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
if [ -n "${ZBX_VAULTDBPATH}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
update_config_var $ZBX_CONFIG "Vault" "${ZBX_VAULT}"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath" "${ZBX_VAULTDBPATH}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile" "${ZBX_VAULTTLSCERTFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile" "${ZBX_VAULTTLSKEYFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultURL" "${ZBX_VAULTURL}"
|
||||
update_config_var $ZBX_CONFIG "DBUser"
|
||||
update_config_var $ZBX_CONFIG "DBPassword"
|
||||
else
|
||||
update_config_var $ZBX_CONFIG "Vault"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile"
|
||||
update_config_var $ZBX_CONFIG "VaultURL"
|
||||
update_config_var $ZBX_CONFIG "DBUser" "${DB_SERVER_ZBX_USER}"
|
||||
update_config_var $ZBX_CONFIG "DBPassword" "${DB_SERVER_ZBX_PASS}"
|
||||
|
@ -358,13 +358,19 @@ update_zbx_config() {
|
||||
update_config_var $ZBX_CONFIG "DBSchema" "${DB_SERVER_SCHEMA}"
|
||||
update_config_var $ZBX_CONFIG "DBPort" "${DB_SERVER_PORT}"
|
||||
|
||||
if [ -n "${VAULT_TOKEN}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
if [ -n "${ZBX_VAULTDBPATH}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
update_config_var $ZBX_CONFIG "Vault" "${ZBX_VAULT}"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath" "${ZBX_VAULTDBPATH}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile" "${ZBX_VAULTTLSCERTFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile" "${ZBX_VAULTTLSKEYFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultURL" "${ZBX_VAULTURL}"
|
||||
update_config_var $ZBX_CONFIG "DBUser"
|
||||
update_config_var $ZBX_CONFIG "DBPassword"
|
||||
else
|
||||
update_config_var $ZBX_CONFIG "Vault"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile"
|
||||
update_config_var $ZBX_CONFIG "VaultURL"
|
||||
update_config_var $ZBX_CONFIG "DBUser" "${DB_SERVER_ZBX_USER}"
|
||||
update_config_var $ZBX_CONFIG "DBPassword" "${DB_SERVER_ZBX_PASS}"
|
||||
|
@ -358,13 +358,19 @@ update_zbx_config() {
|
||||
update_config_var $ZBX_CONFIG "DBSchema" "${DB_SERVER_SCHEMA}"
|
||||
update_config_var $ZBX_CONFIG "DBPort" "${DB_SERVER_PORT}"
|
||||
|
||||
if [ -n "${VAULT_TOKEN}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
if [ -n "${ZBX_VAULTDBPATH}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
update_config_var $ZBX_CONFIG "Vault" "${ZBX_VAULT}"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath" "${ZBX_VAULTDBPATH}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile" "${ZBX_VAULTTLSCERTFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile" "${ZBX_VAULTTLSKEYFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultURL" "${ZBX_VAULTURL}"
|
||||
update_config_var $ZBX_CONFIG "DBUser"
|
||||
update_config_var $ZBX_CONFIG "DBPassword"
|
||||
else
|
||||
update_config_var $ZBX_CONFIG "Vault"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile"
|
||||
update_config_var $ZBX_CONFIG "VaultURL"
|
||||
update_config_var $ZBX_CONFIG "DBUser" "${DB_SERVER_ZBX_USER}"
|
||||
update_config_var $ZBX_CONFIG "DBPassword" "${DB_SERVER_ZBX_PASS}"
|
||||
|
@ -359,13 +359,19 @@ update_zbx_config() {
|
||||
update_config_var $ZBX_CONFIG "DBSchema" "${DB_SERVER_SCHEMA}"
|
||||
update_config_var $ZBX_CONFIG "DBPort" "${DB_SERVER_PORT}"
|
||||
|
||||
if [ -n "${VAULT_TOKEN}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
if [ -n "${ZBX_VAULTDBPATH}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
update_config_var $ZBX_CONFIG "Vault" "${ZBX_VAULT}"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath" "${ZBX_VAULTDBPATH}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile" "${ZBX_VAULTTLSCERTFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile" "${ZBX_VAULTTLSKEYFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultURL" "${ZBX_VAULTURL}"
|
||||
update_config_var $ZBX_CONFIG "DBUser"
|
||||
update_config_var $ZBX_CONFIG "DBPassword"
|
||||
else
|
||||
update_config_var $ZBX_CONFIG "Vault"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile"
|
||||
update_config_var $ZBX_CONFIG "VaultURL"
|
||||
update_config_var $ZBX_CONFIG "DBUser" "${DB_SERVER_ZBX_USER}"
|
||||
update_config_var $ZBX_CONFIG "DBPassword" "${DB_SERVER_ZBX_PASS}"
|
||||
|
@ -356,13 +356,19 @@ update_zbx_config() {
|
||||
update_config_var $ZBX_CONFIG "DBSchema" "${DB_SERVER_SCHEMA}"
|
||||
update_config_var $ZBX_CONFIG "DBPort" "${DB_SERVER_PORT}"
|
||||
|
||||
if [ -n "${VAULT_TOKEN}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
if [ -n "${ZBX_VAULTDBPATH}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
update_config_var $ZBX_CONFIG "Vault" "${ZBX_VAULT}"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath" "${ZBX_VAULTDBPATH}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile" "${ZBX_VAULTTLSCERTFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile" "${ZBX_VAULTTLSKEYFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultURL" "${ZBX_VAULTURL}"
|
||||
update_config_var $ZBX_CONFIG "DBUser"
|
||||
update_config_var $ZBX_CONFIG "DBPassword"
|
||||
else
|
||||
update_config_var $ZBX_CONFIG "Vault"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile"
|
||||
update_config_var $ZBX_CONFIG "VaultURL"
|
||||
update_config_var $ZBX_CONFIG "DBUser" "${DB_SERVER_ZBX_USER}"
|
||||
update_config_var $ZBX_CONFIG "DBPassword" "${DB_SERVER_ZBX_PASS}"
|
||||
|
@ -356,13 +356,19 @@ update_zbx_config() {
|
||||
update_config_var $ZBX_CONFIG "DBSchema" "${DB_SERVER_SCHEMA}"
|
||||
update_config_var $ZBX_CONFIG "DBPort" "${DB_SERVER_PORT}"
|
||||
|
||||
if [ -n "${VAULT_TOKEN}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
if [ -n "${ZBX_VAULTDBPATH}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
update_config_var $ZBX_CONFIG "Vault" "${ZBX_VAULT}"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath" "${ZBX_VAULTDBPATH}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile" "${ZBX_VAULTTLSCERTFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile" "${ZBX_VAULTTLSKEYFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultURL" "${ZBX_VAULTURL}"
|
||||
update_config_var $ZBX_CONFIG "DBUser"
|
||||
update_config_var $ZBX_CONFIG "DBPassword"
|
||||
else
|
||||
update_config_var $ZBX_CONFIG "Vault"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile"
|
||||
update_config_var $ZBX_CONFIG "VaultURL"
|
||||
update_config_var $ZBX_CONFIG "DBUser" "${DB_SERVER_ZBX_USER}"
|
||||
update_config_var $ZBX_CONFIG "DBPassword" "${DB_SERVER_ZBX_PASS}"
|
||||
|
@ -356,13 +356,19 @@ update_zbx_config() {
|
||||
update_config_var $ZBX_CONFIG "DBSchema" "${DB_SERVER_SCHEMA}"
|
||||
update_config_var $ZBX_CONFIG "DBPort" "${DB_SERVER_PORT}"
|
||||
|
||||
if [ -n "${VAULT_TOKEN}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
if [ -n "${ZBX_VAULTDBPATH}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
update_config_var $ZBX_CONFIG "Vault" "${ZBX_VAULT}"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath" "${ZBX_VAULTDBPATH}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile" "${ZBX_VAULTTLSCERTFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile" "${ZBX_VAULTTLSKEYFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultURL" "${ZBX_VAULTURL}"
|
||||
update_config_var $ZBX_CONFIG "DBUser"
|
||||
update_config_var $ZBX_CONFIG "DBPassword"
|
||||
else
|
||||
update_config_var $ZBX_CONFIG "Vault"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile"
|
||||
update_config_var $ZBX_CONFIG "VaultURL"
|
||||
update_config_var $ZBX_CONFIG "DBUser" "${DB_SERVER_ZBX_USER}"
|
||||
update_config_var $ZBX_CONFIG "DBPassword" "${DB_SERVER_ZBX_PASS}"
|
||||
|
@ -356,13 +356,19 @@ update_zbx_config() {
|
||||
update_config_var $ZBX_CONFIG "DBSchema" "${DB_SERVER_SCHEMA}"
|
||||
update_config_var $ZBX_CONFIG "DBPort" "${DB_SERVER_PORT}"
|
||||
|
||||
if [ -n "${VAULT_TOKEN}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
if [ -n "${ZBX_VAULTDBPATH}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
update_config_var $ZBX_CONFIG "Vault" "${ZBX_VAULT}"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath" "${ZBX_VAULTDBPATH}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile" "${ZBX_VAULTTLSCERTFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile" "${ZBX_VAULTTLSKEYFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultURL" "${ZBX_VAULTURL}"
|
||||
update_config_var $ZBX_CONFIG "DBUser"
|
||||
update_config_var $ZBX_CONFIG "DBPassword"
|
||||
else
|
||||
update_config_var $ZBX_CONFIG "Vault"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile"
|
||||
update_config_var $ZBX_CONFIG "VaultURL"
|
||||
update_config_var $ZBX_CONFIG "DBUser" "${DB_SERVER_ZBX_USER}"
|
||||
update_config_var $ZBX_CONFIG "DBPassword" "${DB_SERVER_ZBX_PASS}"
|
||||
|
@ -391,13 +391,19 @@ update_zbx_config() {
|
||||
update_config_var $ZBX_CONFIG "DBSchema" "${DB_SERVER_SCHEMA}"
|
||||
update_config_var $ZBX_CONFIG "DBPort" "${DB_SERVER_PORT}"
|
||||
|
||||
if [ -n "${VAULT_TOKEN}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
if [ -n "${ZBX_VAULTDBPATH}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
update_config_var $ZBX_CONFIG "Vault" "${ZBX_VAULT}"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath" "${ZBX_VAULTDBPATH}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile" "${ZBX_VAULTTLSCERTFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile" "${ZBX_VAULTTLSKEYFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultURL" "${ZBX_VAULTURL}"
|
||||
update_config_var $ZBX_CONFIG "DBUser"
|
||||
update_config_var $ZBX_CONFIG "DBPassword"
|
||||
else
|
||||
update_config_var $ZBX_CONFIG "Vault"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile"
|
||||
update_config_var $ZBX_CONFIG "VaultURL"
|
||||
update_config_var $ZBX_CONFIG "DBUser" "${DB_SERVER_ZBX_USER}"
|
||||
update_config_var $ZBX_CONFIG "DBPassword" "${DB_SERVER_ZBX_PASS}"
|
||||
|
@ -391,13 +391,19 @@ update_zbx_config() {
|
||||
update_config_var $ZBX_CONFIG "DBSchema" "${DB_SERVER_SCHEMA}"
|
||||
update_config_var $ZBX_CONFIG "DBPort" "${DB_SERVER_PORT}"
|
||||
|
||||
if [ -n "${VAULT_TOKEN}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
if [ -n "${ZBX_VAULTDBPATH}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
update_config_var $ZBX_CONFIG "Vault" "${ZBX_VAULT}"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath" "${ZBX_VAULTDBPATH}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile" "${ZBX_VAULTTLSCERTFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile" "${ZBX_VAULTTLSKEYFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultURL" "${ZBX_VAULTURL}"
|
||||
update_config_var $ZBX_CONFIG "DBUser"
|
||||
update_config_var $ZBX_CONFIG "DBPassword"
|
||||
else
|
||||
update_config_var $ZBX_CONFIG "Vault"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile"
|
||||
update_config_var $ZBX_CONFIG "VaultURL"
|
||||
update_config_var $ZBX_CONFIG "DBUser" "${DB_SERVER_ZBX_USER}"
|
||||
update_config_var $ZBX_CONFIG "DBPassword" "${DB_SERVER_ZBX_PASS}"
|
||||
|
@ -391,13 +391,19 @@ update_zbx_config() {
|
||||
update_config_var $ZBX_CONFIG "DBSchema" "${DB_SERVER_SCHEMA}"
|
||||
update_config_var $ZBX_CONFIG "DBPort" "${DB_SERVER_PORT}"
|
||||
|
||||
if [ -n "${VAULT_TOKEN}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
if [ -n "${ZBX_VAULTDBPATH}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
update_config_var $ZBX_CONFIG "Vault" "${ZBX_VAULT}"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath" "${ZBX_VAULTDBPATH}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile" "${ZBX_VAULTTLSCERTFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile" "${ZBX_VAULTTLSKEYFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultURL" "${ZBX_VAULTURL}"
|
||||
update_config_var $ZBX_CONFIG "DBUser"
|
||||
update_config_var $ZBX_CONFIG "DBPassword"
|
||||
else
|
||||
update_config_var $ZBX_CONFIG "Vault"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile"
|
||||
update_config_var $ZBX_CONFIG "VaultURL"
|
||||
update_config_var $ZBX_CONFIG "DBUser" "${DB_SERVER_ZBX_USER}"
|
||||
update_config_var $ZBX_CONFIG "DBPassword" "${DB_SERVER_ZBX_PASS}"
|
||||
|
@ -391,13 +391,19 @@ update_zbx_config() {
|
||||
update_config_var $ZBX_CONFIG "DBSchema" "${DB_SERVER_SCHEMA}"
|
||||
update_config_var $ZBX_CONFIG "DBPort" "${DB_SERVER_PORT}"
|
||||
|
||||
if [ -n "${VAULT_TOKEN}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
if [ -n "${ZBX_VAULTDBPATH}" ] && [ -n "${ZBX_VAULTURL}" ]; then
|
||||
update_config_var $ZBX_CONFIG "Vault" "${ZBX_VAULT}"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath" "${ZBX_VAULTDBPATH}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile" "${ZBX_VAULTTLSCERTFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile" "${ZBX_VAULTTLSKEYFILE}"
|
||||
update_config_var $ZBX_CONFIG "VaultURL" "${ZBX_VAULTURL}"
|
||||
update_config_var $ZBX_CONFIG "DBUser"
|
||||
update_config_var $ZBX_CONFIG "DBPassword"
|
||||
else
|
||||
update_config_var $ZBX_CONFIG "Vault"
|
||||
update_config_var $ZBX_CONFIG "VaultDBPath"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSCertFile"
|
||||
update_config_var $ZBX_CONFIG "VaultTLSKeyFile"
|
||||
update_config_var $ZBX_CONFIG "VaultURL"
|
||||
update_config_var $ZBX_CONFIG "DBUser" "${DB_SERVER_ZBX_USER}"
|
||||
update_config_var $ZBX_CONFIG "DBPassword" "${DB_SERVER_ZBX_PASS}"
|
||||
|
@ -27,9 +27,14 @@ $DB['VERIFY_HOST'] = getenv('ZBX_DB_VERIFY_HOST') == 'true' ? true: false;
|
||||
$DB['CIPHER_LIST'] = getenv('ZBX_DB_CIPHER_LIST') ? getenv('ZBX_DB_CIPHER_LIST') : '';
|
||||
|
||||
// Vault configuration. Used if database credentials are stored in Vault secrets manager.
|
||||
$DB['VAULT'] = getenv('ZBX_VAULT');
|
||||
$DB['VAULT_URL'] = getenv('ZBX_VAULTURL');
|
||||
$DB['VAULT_DB_PATH'] = getenv('ZBX_VAULTDBPATH');
|
||||
$DB['VAULT_TOKEN'] = getenv('VAULT_TOKEN');
|
||||
$DB['VAULT_CERT_FILE'] = file_exists('/etc/zabbix/web/certs/vault.crt') ? '/etc/zabbix/web/certs/vault.crt' : (file_exists(getenv('ZBX_VAULTCERTFILE')) ? getenv('ZBX_VAULTCERTFILE') : '');
|
||||
$DB['VAULT_KEY_FILE'] = file_exists('/etc/zabbix/web/certs/vault.key') ? '/etc/zabbix/web/certs/vault.key' : (file_exists(getenv('ZBX_VAULTKEYFILE')) ? getenv('ZBX_VAULTKEYFILE') : '');
|
||||
|
||||
$DB['VAULT_CACHE'] = getenv('ZBX_VAULTCACHE') == 'true' ? true: false;
|
||||
|
||||
// Use IEEE754 compatible value range for 64-bit Numeric (float) history values.
|
||||
// This option is enabled by default for new Zabbix installations.
|
||||
|
@ -173,9 +173,12 @@ prepare_zbx_web_config() {
|
||||
: ${ZBX_DB_VERIFY_HOST:="false"}
|
||||
export ZBX_DB_VERIFY_HOST=${ZBX_DB_VERIFY_HOST,,}
|
||||
|
||||
export ZBX_VAULT=${ZBX_VAULT}
|
||||
export ZBX_VAULTURL=${ZBX_VAULTURL}
|
||||
export ZBX_VAULTDBPATH=${ZBX_VAULTDBPATH}
|
||||
export VAULT_TOKEN=${VAULT_TOKEN}
|
||||
export ZBX_VAULTCERTFILE=${ZBX_VAULTCERTFILE}
|
||||
export ZBX_VAULTKEYFILE=${ZBX_VAULTKEYFILE}
|
||||
|
||||
: ${DB_DOUBLE_IEEE754:="true"}
|
||||
export DB_DOUBLE_IEEE754=${DB_DOUBLE_IEEE754,,}
|
||||
|
@ -27,9 +27,14 @@ $DB['VERIFY_HOST'] = getenv('ZBX_DB_VERIFY_HOST') == 'true' ? true: false;
|
||||
$DB['CIPHER_LIST'] = getenv('ZBX_DB_CIPHER_LIST') ? getenv('ZBX_DB_CIPHER_LIST') : '';
|
||||
|
||||
// Vault configuration. Used if database credentials are stored in Vault secrets manager.
|
||||
$DB['VAULT'] = getenv('ZBX_VAULT');
|
||||
$DB['VAULT_URL'] = getenv('ZBX_VAULTURL');
|
||||
$DB['VAULT_DB_PATH'] = getenv('ZBX_VAULTDBPATH');
|
||||
$DB['VAULT_TOKEN'] = getenv('VAULT_TOKEN');
|
||||
$DB['VAULT_CERT_FILE'] = file_exists('/etc/zabbix/web/certs/vault.crt') ? '/etc/zabbix/web/certs/vault.crt' : (file_exists(getenv('ZBX_VAULTCERTFILE')) ? getenv('ZBX_VAULTCERTFILE') : '');
|
||||
$DB['VAULT_KEY_FILE'] = file_exists('/etc/zabbix/web/certs/vault.key') ? '/etc/zabbix/web/certs/vault.key' : (file_exists(getenv('ZBX_VAULTKEYFILE')) ? getenv('ZBX_VAULTKEYFILE') : '');
|
||||
|
||||
$DB['VAULT_CACHE'] = getenv('ZBX_VAULTCACHE') == 'true' ? true: false;
|
||||
|
||||
// Use IEEE754 compatible value range for 64-bit Numeric (float) history values.
|
||||
// This option is enabled by default for new Zabbix installations.
|
||||
|
@ -189,9 +189,12 @@ prepare_zbx_web_config() {
|
||||
: ${ZBX_DB_VERIFY_HOST:="false"}
|
||||
export ZBX_DB_VERIFY_HOST=${ZBX_DB_VERIFY_HOST,,}
|
||||
|
||||
export ZBX_VAULT=${ZBX_VAULT}
|
||||
export ZBX_VAULTURL=${ZBX_VAULTURL}
|
||||
export ZBX_VAULTDBPATH=${ZBX_VAULTDBPATH}
|
||||
export VAULT_TOKEN=${VAULT_TOKEN}
|
||||
export ZBX_VAULTCERTFILE=${ZBX_VAULTCERTFILE}
|
||||
export ZBX_VAULTKEYFILE=${ZBX_VAULTKEYFILE}
|
||||
|
||||
: ${DB_DOUBLE_IEEE754:="true"}
|
||||
export DB_DOUBLE_IEEE754=${DB_DOUBLE_IEEE754,,}
|
||||
|
@ -27,9 +27,14 @@ $DB['VERIFY_HOST'] = getenv('ZBX_DB_VERIFY_HOST') == 'true' ? true: false;
|
||||
$DB['CIPHER_LIST'] = getenv('ZBX_DB_CIPHER_LIST') ? getenv('ZBX_DB_CIPHER_LIST') : '';
|
||||
|
||||
// Vault configuration. Used if database credentials are stored in Vault secrets manager.
|
||||
$DB['VAULT'] = getenv('ZBX_VAULT');
|
||||
$DB['VAULT_URL'] = getenv('ZBX_VAULTURL');
|
||||
$DB['VAULT_DB_PATH'] = getenv('ZBX_VAULTDBPATH');
|
||||
$DB['VAULT_TOKEN'] = getenv('VAULT_TOKEN');
|
||||
$DB['VAULT_CERT_FILE'] = file_exists('/etc/zabbix/web/certs/vault.crt') ? '/etc/zabbix/web/certs/vault.crt' : (file_exists(getenv('ZBX_VAULTCERTFILE')) ? getenv('ZBX_VAULTCERTFILE') : '');
|
||||
$DB['VAULT_KEY_FILE'] = file_exists('/etc/zabbix/web/certs/vault.key') ? '/etc/zabbix/web/certs/vault.key' : (file_exists(getenv('ZBX_VAULTKEYFILE')) ? getenv('ZBX_VAULTKEYFILE') : '');
|
||||
|
||||
$DB['VAULT_CACHE'] = getenv('ZBX_VAULTCACHE') == 'true' ? true: false;
|
||||
|
||||
// Use IEEE754 compatible value range for 64-bit Numeric (float) history values.
|
||||
// This option is enabled by default for new Zabbix installations.
|
||||
|
@ -189,9 +189,12 @@ prepare_zbx_web_config() {
|
||||
: ${ZBX_DB_VERIFY_HOST:="false"}
|
||||
export ZBX_DB_VERIFY_HOST=${ZBX_DB_VERIFY_HOST,,}
|
||||
|
||||
export ZBX_VAULT=${ZBX_VAULT}
|
||||
export ZBX_VAULTURL=${ZBX_VAULTURL}
|
||||
export ZBX_VAULTDBPATH=${ZBX_VAULTDBPATH}
|
||||
export VAULT_TOKEN=${VAULT_TOKEN}
|
||||
export ZBX_VAULTCERTFILE=${ZBX_VAULTCERTFILE}
|
||||
export ZBX_VAULTKEYFILE=${ZBX_VAULTKEYFILE}
|
||||
|
||||
: ${DB_DOUBLE_IEEE754:="true"}
|
||||
export DB_DOUBLE_IEEE754=${DB_DOUBLE_IEEE754,,}
|
||||
|
@ -27,9 +27,14 @@ $DB['VERIFY_HOST'] = getenv('ZBX_DB_VERIFY_HOST') == 'true' ? true: false;
|
||||
$DB['CIPHER_LIST'] = getenv('ZBX_DB_CIPHER_LIST') ? getenv('ZBX_DB_CIPHER_LIST') : '';
|
||||
|
||||
// Vault configuration. Used if database credentials are stored in Vault secrets manager.
|
||||
$DB['VAULT'] = getenv('ZBX_VAULT');
|
||||
$DB['VAULT_URL'] = getenv('ZBX_VAULTURL');
|
||||
$DB['VAULT_DB_PATH'] = getenv('ZBX_VAULTDBPATH');
|
||||
$DB['VAULT_TOKEN'] = getenv('VAULT_TOKEN');
|
||||
$DB['VAULT_CERT_FILE'] = file_exists('/etc/zabbix/web/certs/vault.crt') ? '/etc/zabbix/web/certs/vault.crt' : (file_exists(getenv('ZBX_VAULTCERTFILE')) ? getenv('ZBX_VAULTCERTFILE') : '');
|
||||
$DB['VAULT_KEY_FILE'] = file_exists('/etc/zabbix/web/certs/vault.key') ? '/etc/zabbix/web/certs/vault.key' : (file_exists(getenv('ZBX_VAULTKEYFILE')) ? getenv('ZBX_VAULTKEYFILE') : '');
|
||||
|
||||
$DB['VAULT_CACHE'] = getenv('ZBX_VAULTCACHE') == 'true' ? true: false;
|
||||
|
||||
// Use IEEE754 compatible value range for 64-bit Numeric (float) history values.
|
||||
// This option is enabled by default for new Zabbix installations.
|
||||
|
@ -173,9 +173,12 @@ prepare_zbx_web_config() {
|
||||
: ${ZBX_DB_VERIFY_HOST:="false"}
|
||||
export ZBX_DB_VERIFY_HOST=${ZBX_DB_VERIFY_HOST,,}
|
||||
|
||||
export ZBX_VAULT=${ZBX_VAULT}
|
||||
export ZBX_VAULTURL=${ZBX_VAULTURL}
|
||||
export ZBX_VAULTDBPATH=${ZBX_VAULTDBPATH}
|
||||
export VAULT_TOKEN=${VAULT_TOKEN}
|
||||
export ZBX_VAULTCERTFILE=${ZBX_VAULTCERTFILE}
|
||||
export ZBX_VAULTKEYFILE=${ZBX_VAULTKEYFILE}
|
||||
|
||||
: ${DB_DOUBLE_IEEE754:="true"}
|
||||
export DB_DOUBLE_IEEE754=${DB_DOUBLE_IEEE754,,}
|
||||
|
@ -27,9 +27,14 @@ $DB['VERIFY_HOST'] = getenv('ZBX_DB_VERIFY_HOST') == 'true' ? true: false;
|
||||
$DB['CIPHER_LIST'] = getenv('ZBX_DB_CIPHER_LIST') ? getenv('ZBX_DB_CIPHER_LIST') : '';
|
||||
|
||||
// Vault configuration. Used if database credentials are stored in Vault secrets manager.
|
||||
$DB['VAULT'] = getenv('ZBX_VAULT');
|
||||
$DB['VAULT_URL'] = getenv('ZBX_VAULTURL');
|
||||
$DB['VAULT_DB_PATH'] = getenv('ZBX_VAULTDBPATH');
|
||||
$DB['VAULT_TOKEN'] = getenv('VAULT_TOKEN');
|
||||
$DB['VAULT_CERT_FILE'] = file_exists('/etc/zabbix/web/certs/vault.crt') ? '/etc/zabbix/web/certs/vault.crt' : (file_exists(getenv('ZBX_VAULTCERTFILE')) ? getenv('ZBX_VAULTCERTFILE') : '');
|
||||
$DB['VAULT_KEY_FILE'] = file_exists('/etc/zabbix/web/certs/vault.key') ? '/etc/zabbix/web/certs/vault.key' : (file_exists(getenv('ZBX_VAULTKEYFILE')) ? getenv('ZBX_VAULTKEYFILE') : '');
|
||||
|
||||
$DB['VAULT_CACHE'] = getenv('ZBX_VAULTCACHE') == 'true' ? true: false;
|
||||
|
||||
// Use IEEE754 compatible value range for 64-bit Numeric (float) history values.
|
||||
// This option is enabled by default for new Zabbix installations.
|
||||
|
@ -173,9 +173,12 @@ prepare_zbx_web_config() {
|
||||
: ${ZBX_DB_VERIFY_HOST:="false"}
|
||||
export ZBX_DB_VERIFY_HOST=${ZBX_DB_VERIFY_HOST,,}
|
||||
|
||||
export ZBX_VAULT=${ZBX_VAULT}
|
||||
export ZBX_VAULTURL=${ZBX_VAULTURL}
|
||||
export ZBX_VAULTDBPATH=${ZBX_VAULTDBPATH}
|
||||
export VAULT_TOKEN=${VAULT_TOKEN}
|
||||
export ZBX_VAULTCERTFILE=${ZBX_VAULTCERTFILE}
|
||||
export ZBX_VAULTKEYFILE=${ZBX_VAULTKEYFILE}
|
||||
|
||||
: ${DB_DOUBLE_IEEE754:="true"}
|
||||
export DB_DOUBLE_IEEE754=${DB_DOUBLE_IEEE754,,}
|
||||
|
@ -27,9 +27,14 @@ $DB['VERIFY_HOST'] = getenv('ZBX_DB_VERIFY_HOST') == 'true' ? true: false;
|
||||
$DB['CIPHER_LIST'] = getenv('ZBX_DB_CIPHER_LIST') ? getenv('ZBX_DB_CIPHER_LIST') : '';
|
||||
|
||||
// Vault configuration. Used if database credentials are stored in Vault secrets manager.
|
||||
$DB['VAULT'] = getenv('ZBX_VAULT');
|
||||
$DB['VAULT_URL'] = getenv('ZBX_VAULTURL');
|
||||
$DB['VAULT_DB_PATH'] = getenv('ZBX_VAULTDBPATH');
|
||||
$DB['VAULT_TOKEN'] = getenv('VAULT_TOKEN');
|
||||
$DB['VAULT_CERT_FILE'] = file_exists('/etc/zabbix/web/certs/vault.crt') ? '/etc/zabbix/web/certs/vault.crt' : (file_exists(getenv('ZBX_VAULTCERTFILE')) ? getenv('ZBX_VAULTCERTFILE') : '');
|
||||
$DB['VAULT_KEY_FILE'] = file_exists('/etc/zabbix/web/certs/vault.key') ? '/etc/zabbix/web/certs/vault.key' : (file_exists(getenv('ZBX_VAULTKEYFILE')) ? getenv('ZBX_VAULTKEYFILE') : '');
|
||||
|
||||
$DB['VAULT_CACHE'] = getenv('ZBX_VAULTCACHE') == 'true' ? true: false;
|
||||
|
||||
// Use IEEE754 compatible value range for 64-bit Numeric (float) history values.
|
||||
// This option is enabled by default for new Zabbix installations.
|
||||
|
@ -189,9 +189,12 @@ prepare_zbx_web_config() {
|
||||
: ${ZBX_DB_VERIFY_HOST:="false"}
|
||||
export ZBX_DB_VERIFY_HOST=${ZBX_DB_VERIFY_HOST,,}
|
||||
|
||||
export ZBX_VAULT=${ZBX_VAULT}
|
||||
export ZBX_VAULTURL=${ZBX_VAULTURL}
|
||||
export ZBX_VAULTDBPATH=${ZBX_VAULTDBPATH}
|
||||
export VAULT_TOKEN=${VAULT_TOKEN}
|
||||
export ZBX_VAULTCERTFILE=${ZBX_VAULTCERTFILE}
|
||||
export ZBX_VAULTKEYFILE=${ZBX_VAULTKEYFILE}
|
||||
|
||||
: ${DB_DOUBLE_IEEE754:="true"}
|
||||
export DB_DOUBLE_IEEE754=${DB_DOUBLE_IEEE754,,}
|
||||
|
@ -27,9 +27,14 @@ $DB['VERIFY_HOST'] = getenv('ZBX_DB_VERIFY_HOST') == 'true' ? true: false;
|
||||
$DB['CIPHER_LIST'] = getenv('ZBX_DB_CIPHER_LIST') ? getenv('ZBX_DB_CIPHER_LIST') : '';
|
||||
|
||||
// Vault configuration. Used if database credentials are stored in Vault secrets manager.
|
||||
$DB['VAULT'] = getenv('ZBX_VAULT');
|
||||
$DB['VAULT_URL'] = getenv('ZBX_VAULTURL');
|
||||
$DB['VAULT_DB_PATH'] = getenv('ZBX_VAULTDBPATH');
|
||||
$DB['VAULT_TOKEN'] = getenv('VAULT_TOKEN');
|
||||
$DB['VAULT_CERT_FILE'] = file_exists('/etc/zabbix/web/certs/vault.crt') ? '/etc/zabbix/web/certs/vault.crt' : (file_exists(getenv('ZBX_VAULTCERTFILE')) ? getenv('ZBX_VAULTCERTFILE') : '');
|
||||
$DB['VAULT_KEY_FILE'] = file_exists('/etc/zabbix/web/certs/vault.key') ? '/etc/zabbix/web/certs/vault.key' : (file_exists(getenv('ZBX_VAULTKEYFILE')) ? getenv('ZBX_VAULTKEYFILE') : '');
|
||||
|
||||
$DB['VAULT_CACHE'] = getenv('ZBX_VAULTCACHE') == 'true' ? true: false;
|
||||
|
||||
// Use IEEE754 compatible value range for 64-bit Numeric (float) history values.
|
||||
// This option is enabled by default for new Zabbix installations.
|
||||
|
@ -189,9 +189,12 @@ prepare_zbx_web_config() {
|
||||
: ${ZBX_DB_VERIFY_HOST:="false"}
|
||||
export ZBX_DB_VERIFY_HOST=${ZBX_DB_VERIFY_HOST,,}
|
||||
|
||||
export ZBX_VAULT=${ZBX_VAULT}
|
||||
export ZBX_VAULTURL=${ZBX_VAULTURL}
|
||||
export ZBX_VAULTDBPATH=${ZBX_VAULTDBPATH}
|
||||
export VAULT_TOKEN=${VAULT_TOKEN}
|
||||
export ZBX_VAULTCERTFILE=${ZBX_VAULTCERTFILE}
|
||||
export ZBX_VAULTKEYFILE=${ZBX_VAULTKEYFILE}
|
||||
|
||||
: ${DB_DOUBLE_IEEE754:="true"}
|
||||
export DB_DOUBLE_IEEE754=${DB_DOUBLE_IEEE754,,}
|
||||
|
@ -27,9 +27,14 @@ $DB['VERIFY_HOST'] = getenv('ZBX_DB_VERIFY_HOST') == 'true' ? true: false;
|
||||
$DB['CIPHER_LIST'] = getenv('ZBX_DB_CIPHER_LIST') ? getenv('ZBX_DB_CIPHER_LIST') : '';
|
||||
|
||||
// Vault configuration. Used if database credentials are stored in Vault secrets manager.
|
||||
$DB['VAULT'] = getenv('ZBX_VAULT');
|
||||
$DB['VAULT_URL'] = getenv('ZBX_VAULTURL');
|
||||
$DB['VAULT_DB_PATH'] = getenv('ZBX_VAULTDBPATH');
|
||||
$DB['VAULT_TOKEN'] = getenv('VAULT_TOKEN');
|
||||
$DB['VAULT_CERT_FILE'] = file_exists('/etc/zabbix/web/certs/vault.crt') ? '/etc/zabbix/web/certs/vault.crt' : (file_exists(getenv('ZBX_VAULTCERTFILE')) ? getenv('ZBX_VAULTCERTFILE') : '');
|
||||
$DB['VAULT_KEY_FILE'] = file_exists('/etc/zabbix/web/certs/vault.key') ? '/etc/zabbix/web/certs/vault.key' : (file_exists(getenv('ZBX_VAULTKEYFILE')) ? getenv('ZBX_VAULTKEYFILE') : '');
|
||||
|
||||
$DB['VAULT_CACHE'] = getenv('ZBX_VAULTCACHE') == 'true' ? true: false;
|
||||
|
||||
// Use IEEE754 compatible value range for 64-bit Numeric (float) history values.
|
||||
// This option is enabled by default for new Zabbix installations.
|
||||
|
@ -177,9 +177,12 @@ prepare_zbx_web_config() {
|
||||
: ${ZBX_DB_VERIFY_HOST:="false"}
|
||||
export ZBX_DB_VERIFY_HOST=${ZBX_DB_VERIFY_HOST,,}
|
||||
|
||||
export ZBX_VAULT=${ZBX_VAULT}
|
||||
export ZBX_VAULTURL=${ZBX_VAULTURL}
|
||||
export ZBX_VAULTDBPATH=${ZBX_VAULTDBPATH}
|
||||
export VAULT_TOKEN=${VAULT_TOKEN}
|
||||
export ZBX_VAULTCERTFILE=${ZBX_VAULTCERTFILE}
|
||||
export ZBX_VAULTKEYFILE=${ZBX_VAULTKEYFILE}
|
||||
|
||||
: ${DB_DOUBLE_IEEE754:="true"}
|
||||
export DB_DOUBLE_IEEE754=${DB_DOUBLE_IEEE754,,}
|
||||
|
@ -27,9 +27,14 @@ $DB['VERIFY_HOST'] = getenv('ZBX_DB_VERIFY_HOST') == 'true' ? true: false;
|
||||
$DB['CIPHER_LIST'] = getenv('ZBX_DB_CIPHER_LIST') ? getenv('ZBX_DB_CIPHER_LIST') : '';
|
||||
|
||||
// Vault configuration. Used if database credentials are stored in Vault secrets manager.
|
||||
$DB['VAULT'] = getenv('ZBX_VAULT');
|
||||
$DB['VAULT_URL'] = getenv('ZBX_VAULTURL');
|
||||
$DB['VAULT_DB_PATH'] = getenv('ZBX_VAULTDBPATH');
|
||||
$DB['VAULT_TOKEN'] = getenv('VAULT_TOKEN');
|
||||
$DB['VAULT_CERT_FILE'] = file_exists('/etc/zabbix/web/certs/vault.crt') ? '/etc/zabbix/web/certs/vault.crt' : (file_exists(getenv('ZBX_VAULTCERTFILE')) ? getenv('ZBX_VAULTCERTFILE') : '');
|
||||
$DB['VAULT_KEY_FILE'] = file_exists('/etc/zabbix/web/certs/vault.key') ? '/etc/zabbix/web/certs/vault.key' : (file_exists(getenv('ZBX_VAULTKEYFILE')) ? getenv('ZBX_VAULTKEYFILE') : '');
|
||||
|
||||
$DB['VAULT_CACHE'] = getenv('ZBX_VAULTCACHE') == 'true' ? true: false;
|
||||
|
||||
// Use IEEE754 compatible value range for 64-bit Numeric (float) history values.
|
||||
// This option is enabled by default for new Zabbix installations.
|
||||
|
@ -195,9 +195,12 @@ prepare_zbx_web_config() {
|
||||
: ${ZBX_DB_VERIFY_HOST:="false"}
|
||||
export ZBX_DB_VERIFY_HOST=${ZBX_DB_VERIFY_HOST,,}
|
||||
|
||||
export ZBX_VAULT=${ZBX_VAULT}
|
||||
export ZBX_VAULTURL=${ZBX_VAULTURL}
|
||||
export ZBX_VAULTDBPATH=${ZBX_VAULTDBPATH}
|
||||
export VAULT_TOKEN=${VAULT_TOKEN}
|
||||
export ZBX_VAULTCERTFILE=${ZBX_VAULTCERTFILE}
|
||||
export ZBX_VAULTKEYFILE=${ZBX_VAULTKEYFILE}
|
||||
|
||||
: ${DB_DOUBLE_IEEE754:="true"}
|
||||
export DB_DOUBLE_IEEE754=${DB_DOUBLE_IEEE754,,}
|
||||
|
@ -27,9 +27,14 @@ $DB['VERIFY_HOST'] = getenv('ZBX_DB_VERIFY_HOST') == 'true' ? true: false;
|
||||
$DB['CIPHER_LIST'] = getenv('ZBX_DB_CIPHER_LIST') ? getenv('ZBX_DB_CIPHER_LIST') : '';
|
||||
|
||||
// Vault configuration. Used if database credentials are stored in Vault secrets manager.
|
||||
$DB['VAULT'] = getenv('ZBX_VAULT');
|
||||
$DB['VAULT_URL'] = getenv('ZBX_VAULTURL');
|
||||
$DB['VAULT_DB_PATH'] = getenv('ZBX_VAULTDBPATH');
|
||||
$DB['VAULT_TOKEN'] = getenv('VAULT_TOKEN');
|
||||
$DB['VAULT_CERT_FILE'] = file_exists('/etc/zabbix/web/certs/vault.crt') ? '/etc/zabbix/web/certs/vault.crt' : (file_exists(getenv('ZBX_VAULTCERTFILE')) ? getenv('ZBX_VAULTCERTFILE') : '');
|
||||
$DB['VAULT_KEY_FILE'] = file_exists('/etc/zabbix/web/certs/vault.key') ? '/etc/zabbix/web/certs/vault.key' : (file_exists(getenv('ZBX_VAULTKEYFILE')) ? getenv('ZBX_VAULTKEYFILE') : '');
|
||||
|
||||
$DB['VAULT_CACHE'] = getenv('ZBX_VAULTCACHE') == 'true' ? true: false;
|
||||
|
||||
// Use IEEE754 compatible value range for 64-bit Numeric (float) history values.
|
||||
// This option is enabled by default for new Zabbix installations.
|
||||
|
@ -195,9 +195,12 @@ prepare_zbx_web_config() {
|
||||
: ${ZBX_DB_VERIFY_HOST:="false"}
|
||||
export ZBX_DB_VERIFY_HOST=${ZBX_DB_VERIFY_HOST,,}
|
||||
|
||||
export ZBX_VAULT=${ZBX_VAULT}
|
||||
export ZBX_VAULTURL=${ZBX_VAULTURL}
|
||||
export ZBX_VAULTDBPATH=${ZBX_VAULTDBPATH}
|
||||
export VAULT_TOKEN=${VAULT_TOKEN}
|
||||
export ZBX_VAULTCERTFILE=${ZBX_VAULTCERTFILE}
|
||||
export ZBX_VAULTKEYFILE=${ZBX_VAULTKEYFILE}
|
||||
|
||||
: ${DB_DOUBLE_IEEE754:="true"}
|
||||
export DB_DOUBLE_IEEE754=${DB_DOUBLE_IEEE754,,}
|
||||
|
@ -27,9 +27,14 @@ $DB['VERIFY_HOST'] = getenv('ZBX_DB_VERIFY_HOST') == 'true' ? true: false;
|
||||
$DB['CIPHER_LIST'] = getenv('ZBX_DB_CIPHER_LIST') ? getenv('ZBX_DB_CIPHER_LIST') : '';
|
||||
|
||||
// Vault configuration. Used if database credentials are stored in Vault secrets manager.
|
||||
$DB['VAULT'] = getenv('ZBX_VAULT');
|
||||
$DB['VAULT_URL'] = getenv('ZBX_VAULTURL');
|
||||
$DB['VAULT_DB_PATH'] = getenv('ZBX_VAULTDBPATH');
|
||||
$DB['VAULT_TOKEN'] = getenv('VAULT_TOKEN');
|
||||
$DB['VAULT_CERT_FILE'] = file_exists('/etc/zabbix/web/certs/vault.crt') ? '/etc/zabbix/web/certs/vault.crt' : (file_exists(getenv('ZBX_VAULTCERTFILE')) ? getenv('ZBX_VAULTCERTFILE') : '');
|
||||
$DB['VAULT_KEY_FILE'] = file_exists('/etc/zabbix/web/certs/vault.key') ? '/etc/zabbix/web/certs/vault.key' : (file_exists(getenv('ZBX_VAULTKEYFILE')) ? getenv('ZBX_VAULTKEYFILE') : '');
|
||||
|
||||
$DB['VAULT_CACHE'] = getenv('ZBX_VAULTCACHE') == 'true' ? true: false;
|
||||
|
||||
// Use IEEE754 compatible value range for 64-bit Numeric (float) history values.
|
||||
// This option is enabled by default for new Zabbix installations.
|
||||
|
@ -195,9 +195,12 @@ prepare_zbx_web_config() {
|
||||
: ${ZBX_DB_VERIFY_HOST:="false"}
|
||||
export ZBX_DB_VERIFY_HOST=${ZBX_DB_VERIFY_HOST,,}
|
||||
|
||||
export ZBX_VAULT=${ZBX_VAULT}
|
||||
export ZBX_VAULTURL=${ZBX_VAULTURL}
|
||||
export ZBX_VAULTDBPATH=${ZBX_VAULTDBPATH}
|
||||
export VAULT_TOKEN=${VAULT_TOKEN}
|
||||
export ZBX_VAULTCERTFILE=${ZBX_VAULTCERTFILE}
|
||||
export ZBX_VAULTKEYFILE=${ZBX_VAULTKEYFILE}
|
||||
|
||||
: ${DB_DOUBLE_IEEE754:="true"}
|
||||
export DB_DOUBLE_IEEE754=${DB_DOUBLE_IEEE754,,}
|
||||
|
@ -27,9 +27,14 @@ $DB['VERIFY_HOST'] = getenv('ZBX_DB_VERIFY_HOST') == 'true' ? true: false;
|
||||
$DB['CIPHER_LIST'] = getenv('ZBX_DB_CIPHER_LIST') ? getenv('ZBX_DB_CIPHER_LIST') : '';
|
||||
|
||||
// Vault configuration. Used if database credentials are stored in Vault secrets manager.
|
||||
$DB['VAULT'] = getenv('ZBX_VAULT');
|
||||
$DB['VAULT_URL'] = getenv('ZBX_VAULTURL');
|
||||
$DB['VAULT_DB_PATH'] = getenv('ZBX_VAULTDBPATH');
|
||||
$DB['VAULT_TOKEN'] = getenv('VAULT_TOKEN');
|
||||
$DB['VAULT_CERT_FILE'] = file_exists('/etc/zabbix/web/certs/vault.crt') ? '/etc/zabbix/web/certs/vault.crt' : (file_exists(getenv('ZBX_VAULTCERTFILE')) ? getenv('ZBX_VAULTCERTFILE') : '');
|
||||
$DB['VAULT_KEY_FILE'] = file_exists('/etc/zabbix/web/certs/vault.key') ? '/etc/zabbix/web/certs/vault.key' : (file_exists(getenv('ZBX_VAULTKEYFILE')) ? getenv('ZBX_VAULTKEYFILE') : '');
|
||||
|
||||
$DB['VAULT_CACHE'] = getenv('ZBX_VAULTCACHE') == 'true' ? true: false;
|
||||
|
||||
// Use IEEE754 compatible value range for 64-bit Numeric (float) history values.
|
||||
// This option is enabled by default for new Zabbix installations.
|
||||
|
@ -195,9 +195,12 @@ prepare_zbx_web_config() {
|
||||
: ${ZBX_DB_VERIFY_HOST:="false"}
|
||||
export ZBX_DB_VERIFY_HOST=${ZBX_DB_VERIFY_HOST,,}
|
||||
|
||||
export ZBX_VAULT=${ZBX_VAULT}
|
||||
export ZBX_VAULTURL=${ZBX_VAULTURL}
|
||||
export ZBX_VAULTDBPATH=${ZBX_VAULTDBPATH}
|
||||
export VAULT_TOKEN=${VAULT_TOKEN}
|
||||
export ZBX_VAULTCERTFILE=${ZBX_VAULTCERTFILE}
|
||||
export ZBX_VAULTKEYFILE=${ZBX_VAULTKEYFILE}
|
||||
|
||||
: ${DB_DOUBLE_IEEE754:="true"}
|
||||
export DB_DOUBLE_IEEE754=${DB_DOUBLE_IEEE754,,}
|
||||
|
@ -27,9 +27,14 @@ $DB['VERIFY_HOST'] = getenv('ZBX_DB_VERIFY_HOST') == 'true' ? true: false;
|
||||
$DB['CIPHER_LIST'] = getenv('ZBX_DB_CIPHER_LIST') ? getenv('ZBX_DB_CIPHER_LIST') : '';
|
||||
|
||||
// Vault configuration. Used if database credentials are stored in Vault secrets manager.
|
||||
$DB['VAULT'] = getenv('ZBX_VAULT');
|
||||
$DB['VAULT_URL'] = getenv('ZBX_VAULTURL');
|
||||
$DB['VAULT_DB_PATH'] = getenv('ZBX_VAULTDBPATH');
|
||||
$DB['VAULT_TOKEN'] = getenv('VAULT_TOKEN');
|
||||
$DB['VAULT_CERT_FILE'] = file_exists('/etc/zabbix/web/certs/vault.crt') ? '/etc/zabbix/web/certs/vault.crt' : (file_exists(getenv('ZBX_VAULTCERTFILE')) ? getenv('ZBX_VAULTCERTFILE') : '');
|
||||
$DB['VAULT_KEY_FILE'] = file_exists('/etc/zabbix/web/certs/vault.key') ? '/etc/zabbix/web/certs/vault.key' : (file_exists(getenv('ZBX_VAULTKEYFILE')) ? getenv('ZBX_VAULTKEYFILE') : '');
|
||||
|
||||
$DB['VAULT_CACHE'] = getenv('ZBX_VAULTCACHE') == 'true' ? true: false;
|
||||
|
||||
// Use IEEE754 compatible value range for 64-bit Numeric (float) history values.
|
||||
// This option is enabled by default for new Zabbix installations.
|
||||
|
@ -195,9 +195,12 @@ prepare_zbx_web_config() {
|
||||
: ${ZBX_DB_VERIFY_HOST:="false"}
|
||||
export ZBX_DB_VERIFY_HOST=${ZBX_DB_VERIFY_HOST,,}
|
||||
|
||||
export ZBX_VAULT=${ZBX_VAULT}
|
||||
export ZBX_VAULTURL=${ZBX_VAULTURL}
|
||||
export ZBX_VAULTDBPATH=${ZBX_VAULTDBPATH}
|
||||
export VAULT_TOKEN=${VAULT_TOKEN}
|
||||
export ZBX_VAULTCERTFILE=${ZBX_VAULTCERTFILE}
|
||||
export ZBX_VAULTKEYFILE=${ZBX_VAULTKEYFILE}
|
||||
|
||||
: ${DB_DOUBLE_IEEE754:="true"}
|
||||
export DB_DOUBLE_IEEE754=${DB_DOUBLE_IEEE754,,}
|
||||
|
@ -27,9 +27,14 @@ $DB['VERIFY_HOST'] = getenv('ZBX_DB_VERIFY_HOST') == 'true' ? true: false;
|
||||
$DB['CIPHER_LIST'] = getenv('ZBX_DB_CIPHER_LIST') ? getenv('ZBX_DB_CIPHER_LIST') : '';
|
||||
|
||||
// Vault configuration. Used if database credentials are stored in Vault secrets manager.
|
||||
$DB['VAULT'] = getenv('ZBX_VAULT');
|
||||
$DB['VAULT_URL'] = getenv('ZBX_VAULTURL');
|
||||
$DB['VAULT_DB_PATH'] = getenv('ZBX_VAULTDBPATH');
|
||||
$DB['VAULT_TOKEN'] = getenv('VAULT_TOKEN');
|
||||
$DB['VAULT_CERT_FILE'] = file_exists('/etc/zabbix/web/certs/vault.crt') ? '/etc/zabbix/web/certs/vault.crt' : (file_exists(getenv('ZBX_VAULTCERTFILE')) ? getenv('ZBX_VAULTCERTFILE') : '');
|
||||
$DB['VAULT_KEY_FILE'] = file_exists('/etc/zabbix/web/certs/vault.key') ? '/etc/zabbix/web/certs/vault.key' : (file_exists(getenv('ZBX_VAULTKEYFILE')) ? getenv('ZBX_VAULTKEYFILE') : '');
|
||||
|
||||
$DB['VAULT_CACHE'] = getenv('ZBX_VAULTCACHE') == 'true' ? true: false;
|
||||
|
||||
// Use IEEE754 compatible value range for 64-bit Numeric (float) history values.
|
||||
// This option is enabled by default for new Zabbix installations.
|
||||
|
@ -195,9 +195,12 @@ prepare_zbx_web_config() {
|
||||
: ${ZBX_DB_VERIFY_HOST:="false"}
|
||||
export ZBX_DB_VERIFY_HOST=${ZBX_DB_VERIFY_HOST,,}
|
||||
|
||||
export ZBX_VAULT=${ZBX_VAULT}
|
||||
export ZBX_VAULTURL=${ZBX_VAULTURL}
|
||||
export ZBX_VAULTDBPATH=${ZBX_VAULTDBPATH}
|
||||
export VAULT_TOKEN=${VAULT_TOKEN}
|
||||
export ZBX_VAULTCERTFILE=${ZBX_VAULTCERTFILE}
|
||||
export ZBX_VAULTKEYFILE=${ZBX_VAULTKEYFILE}
|
||||
|
||||
: ${DB_DOUBLE_IEEE754:="true"}
|
||||
export DB_DOUBLE_IEEE754=${DB_DOUBLE_IEEE754,,}
|
||||
|
@ -27,9 +27,14 @@ $DB['VERIFY_HOST'] = getenv('ZBX_DB_VERIFY_HOST') == 'true' ? true: false;
|
||||
$DB['CIPHER_LIST'] = getenv('ZBX_DB_CIPHER_LIST') ? getenv('ZBX_DB_CIPHER_LIST') : '';
|
||||
|
||||
// Vault configuration. Used if database credentials are stored in Vault secrets manager.
|
||||
$DB['VAULT'] = getenv('ZBX_VAULT');
|
||||
$DB['VAULT_URL'] = getenv('ZBX_VAULTURL');
|
||||
$DB['VAULT_DB_PATH'] = getenv('ZBX_VAULTDBPATH');
|
||||
$DB['VAULT_TOKEN'] = getenv('VAULT_TOKEN');
|
||||
$DB['VAULT_CERT_FILE'] = file_exists('/etc/zabbix/web/certs/vault.crt') ? '/etc/zabbix/web/certs/vault.crt' : (file_exists(getenv('ZBX_VAULTCERTFILE')) ? getenv('ZBX_VAULTCERTFILE') : '');
|
||||
$DB['VAULT_KEY_FILE'] = file_exists('/etc/zabbix/web/certs/vault.key') ? '/etc/zabbix/web/certs/vault.key' : (file_exists(getenv('ZBX_VAULTKEYFILE')) ? getenv('ZBX_VAULTKEYFILE') : '');
|
||||
|
||||
$DB['VAULT_CACHE'] = getenv('ZBX_VAULTCACHE') == 'true' ? true: false;
|
||||
|
||||
// Use IEEE754 compatible value range for 64-bit Numeric (float) history values.
|
||||
// This option is enabled by default for new Zabbix installations.
|
||||
|
@ -195,9 +195,12 @@ prepare_zbx_web_config() {
|
||||
: ${ZBX_DB_VERIFY_HOST:="false"}
|
||||
export ZBX_DB_VERIFY_HOST=${ZBX_DB_VERIFY_HOST,,}
|
||||
|
||||
export ZBX_VAULT=${ZBX_VAULT}
|
||||
export ZBX_VAULTURL=${ZBX_VAULTURL}
|
||||
export ZBX_VAULTDBPATH=${ZBX_VAULTDBPATH}
|
||||
export VAULT_TOKEN=${VAULT_TOKEN}
|
||||
export ZBX_VAULTCERTFILE=${ZBX_VAULTCERTFILE}
|
||||
export ZBX_VAULTKEYFILE=${ZBX_VAULTKEYFILE}
|
||||
|
||||
: ${DB_DOUBLE_IEEE754:="true"}
|
||||
export DB_DOUBLE_IEEE754=${DB_DOUBLE_IEEE754,,}
|
||||
|
@ -27,9 +27,14 @@ $DB['VERIFY_HOST'] = getenv('ZBX_DB_VERIFY_HOST') == 'true' ? true: false;
|
||||
$DB['CIPHER_LIST'] = getenv('ZBX_DB_CIPHER_LIST') ? getenv('ZBX_DB_CIPHER_LIST') : '';
|
||||
|
||||
// Vault configuration. Used if database credentials are stored in Vault secrets manager.
|
||||
$DB['VAULT'] = getenv('ZBX_VAULT');
|
||||
$DB['VAULT_URL'] = getenv('ZBX_VAULTURL');
|
||||
$DB['VAULT_DB_PATH'] = getenv('ZBX_VAULTDBPATH');
|
||||
$DB['VAULT_TOKEN'] = getenv('VAULT_TOKEN');
|
||||
$DB['VAULT_CERT_FILE'] = file_exists('/etc/zabbix/web/certs/vault.crt') ? '/etc/zabbix/web/certs/vault.crt' : (file_exists(getenv('ZBX_VAULTCERTFILE')) ? getenv('ZBX_VAULTCERTFILE') : '');
|
||||
$DB['VAULT_KEY_FILE'] = file_exists('/etc/zabbix/web/certs/vault.key') ? '/etc/zabbix/web/certs/vault.key' : (file_exists(getenv('ZBX_VAULTKEYFILE')) ? getenv('ZBX_VAULTKEYFILE') : '');
|
||||
|
||||
$DB['VAULT_CACHE'] = getenv('ZBX_VAULTCACHE') == 'true' ? true: false;
|
||||
|
||||
// Use IEEE754 compatible value range for 64-bit Numeric (float) history values.
|
||||
// This option is enabled by default for new Zabbix installations.
|
||||
|
@ -195,9 +195,12 @@ prepare_zbx_web_config() {
|
||||
: ${ZBX_DB_VERIFY_HOST:="false"}
|
||||
export ZBX_DB_VERIFY_HOST=${ZBX_DB_VERIFY_HOST,,}
|
||||
|
||||
export ZBX_VAULT=${ZBX_VAULT}
|
||||
export ZBX_VAULTURL=${ZBX_VAULTURL}
|
||||
export ZBX_VAULTDBPATH=${ZBX_VAULTDBPATH}
|
||||
export VAULT_TOKEN=${VAULT_TOKEN}
|
||||
export ZBX_VAULTCERTFILE=${ZBX_VAULTCERTFILE}
|
||||
export ZBX_VAULTKEYFILE=${ZBX_VAULTKEYFILE}
|
||||
|
||||
: ${DB_DOUBLE_IEEE754:="true"}
|
||||
export DB_DOUBLE_IEEE754=${DB_DOUBLE_IEEE754,,}
|
||||
|
@ -27,9 +27,14 @@ $DB['VERIFY_HOST'] = getenv('ZBX_DB_VERIFY_HOST') == 'true' ? true: false;
|
||||
$DB['CIPHER_LIST'] = getenv('ZBX_DB_CIPHER_LIST') ? getenv('ZBX_DB_CIPHER_LIST') : '';
|
||||
|
||||
// Vault configuration. Used if database credentials are stored in Vault secrets manager.
|
||||
$DB['VAULT'] = getenv('ZBX_VAULT');
|
||||
$DB['VAULT_URL'] = getenv('ZBX_VAULTURL');
|
||||
$DB['VAULT_DB_PATH'] = getenv('ZBX_VAULTDBPATH');
|
||||
$DB['VAULT_TOKEN'] = getenv('VAULT_TOKEN');
|
||||
$DB['VAULT_CERT_FILE'] = file_exists('/etc/zabbix/web/certs/vault.crt') ? '/etc/zabbix/web/certs/vault.crt' : (file_exists(getenv('ZBX_VAULTCERTFILE')) ? getenv('ZBX_VAULTCERTFILE') : '');
|
||||
$DB['VAULT_KEY_FILE'] = file_exists('/etc/zabbix/web/certs/vault.key') ? '/etc/zabbix/web/certs/vault.key' : (file_exists(getenv('ZBX_VAULTKEYFILE')) ? getenv('ZBX_VAULTKEYFILE') : '');
|
||||
|
||||
$DB['VAULT_CACHE'] = getenv('ZBX_VAULTCACHE') == 'true' ? true: false;
|
||||
|
||||
// Use IEEE754 compatible value range for 64-bit Numeric (float) history values.
|
||||
// This option is enabled by default for new Zabbix installations.
|
||||
|
@ -195,9 +195,12 @@ prepare_zbx_web_config() {
|
||||
: ${ZBX_DB_VERIFY_HOST:="false"}
|
||||
export ZBX_DB_VERIFY_HOST=${ZBX_DB_VERIFY_HOST,,}
|
||||
|
||||
export ZBX_VAULT=${ZBX_VAULT}
|
||||
export ZBX_VAULTURL=${ZBX_VAULTURL}
|
||||
export ZBX_VAULTDBPATH=${ZBX_VAULTDBPATH}
|
||||
export VAULT_TOKEN=${VAULT_TOKEN}
|
||||
export ZBX_VAULTCERTFILE=${ZBX_VAULTCERTFILE}
|
||||
export ZBX_VAULTKEYFILE=${ZBX_VAULTKEYFILE}
|
||||
|
||||
: ${DB_DOUBLE_IEEE754:="true"}
|
||||
export DB_DOUBLE_IEEE754=${DB_DOUBLE_IEEE754,,}
|
||||
|
@ -61,6 +61,9 @@
|
||||
# ZBX_TLSKEYFILE=
|
||||
# ZBX_TLSPSKIDENTITY=
|
||||
# ZBX_TLSPSKFILE=
|
||||
# ZBX_VAULT=HashiCorp # Available since 6.2.0
|
||||
# ZBX_VAULTDBPATH=
|
||||
# ZBX_VAULTTLSCERTFILE= # Available since 6.2.0
|
||||
# ZBX_VAULTTLSKEYFILE= # Available since 6.2.0
|
||||
# ZBX_VAULTURL=https://127.0.0.1:8200
|
||||
# VAULT_TOKEN=
|
||||
|
@ -67,7 +67,10 @@ ZBX_ENABLE_SNMP_TRAPS=true
|
||||
# ZBX_TLSCRLFILE=
|
||||
# ZBX_TLSCERTFILE=
|
||||
# ZBX_TLSKEYFILE=
|
||||
# ZBX_VAULT=HashiCorp # Available since 6.2.0
|
||||
# ZBX_VAULTDBPATH=
|
||||
# ZBX_VAULTTLSCERTFILE= # Available since 6.2.0
|
||||
# ZBX_VAULTTLSKEYFILE= # Available since 6.2.0
|
||||
# ZBX_VAULTURL=https://127.0.0.1:8200
|
||||
# VAULT_TOKEN=
|
||||
# ZBX_STARTREPORTWRITERS=0
|
||||
|
@ -7,9 +7,13 @@ ZBX_SERVER_NAME=Composed installation
|
||||
# ZBX_DB_CA_FILE=/run/secrets/root-ca.pem # Available since 5.0.0
|
||||
# ZBX_DB_VERIFY_HOST=false # Available since 5.0.0
|
||||
# ZBX_DB_CIPHER_LIST= # Available since 5.0.0
|
||||
# ZBX_VAULT= # Available since 6.2.0
|
||||
# ZBX_VAULTDBPATH=
|
||||
# ZBX_VAULTURL=https://127.0.0.1:8200
|
||||
# VAULT_TOKEN=
|
||||
# ZBX_VAULTCERTFILE= # Available since 6.2.0
|
||||
# ZBX_VAULTKEYFILE= # Available since 6.2.0
|
||||
# ZBX_VAULTCACHE=false # Available since 6.2.0
|
||||
# ZBX_HISTORYSTORAGEURL=http://elasticsearch:9200/ # Available since 3.4.5
|
||||
# ZBX_HISTORYSTORAGETYPES=['uint', 'dbl', 'str', 'text', 'log'] # Available since 3.4.5
|
||||
# ZBX_SSO_SETTINGS=[] # Available since 5.0.0
|
||||
|
Loading…
Reference in New Issue
Block a user