You are viewing documentation for the development version, it may be incomplete.
Join our translation project and help translate Zabbix documentation into your native language.

5 What's new in Zabbix 8.0.0

See breaking changes for this version.

Templates

New templates

Updated templates

  • The Proxmox VE by HTTP template has been updated with the nested LLD functionality. In addition, the unit format for items displaying percentages has been adjusted for clarity.

Frontend

Inline validation in autoregistration form

The autoregistration action configuration form in the frontend now supports inline validation. Input errors are displayed immediately after filling in the fields, improving usability and reducing configuration mistakes.

Importable SAML certificates for single sign-on

Super admin users can now import certificates and private keys directly in the frontend for SAML configuration. Three new fields were added to Administration > Authentication > SAML:

  • IdP certificate - X.509 certificate presented by the identity provider
  • SP certificate - service provider certificate used for SAML exchanges
  • SP private key - private key corresponding to the SP certificate

These controls allow adding new values or modifying existing ones from the SAML settings tab. Certificates and private keys are validated before being saved to the chosen storage backend; invalid or malformed values are rejected with an explanatory error.

Convert to JSON checkbox in discovery forms

A new Convert to JSON checkbox was added to the Discovery rule form and Discovery prototype form, which is shown if "HTTP agent" is selected in the Type dropdown. This option allows to mark retrieved data for automatic conversion to JSON before further processing.

Documentation

Consolidated documentation pages for minor releases

Release documentation for minor versions of a major Zabbix release will now be collected in single documentation pages for new features and upgrade notes respectively.

Processes

Automatic reload of SNMPv3 credentials

SNMP agent walk[] and get[] item checks now automatically reload updated SNMPv3 authentication and privacy settings when the corresponding SNMPv3 interface is modified. The manual cache reload command -R snmp_cache_reload remains available for troubleshooting and for devices that do not fully comply with SNMPv3 specifications.

Increased maximum timeout for the zabbix_get and zabbix_js

The maximum value for the timeout parameter of the zabbix_get and zabbix_js command-line utilities has been increased to 600 seconds.

Items

smart.disk.discovery — new type parameter

The smart.disk.discovery item (Zabbix agent 2 S.M.A.R.T. plugin) now accepts an optional type parameter to specify a value to scan for the disks.

Plugins

Ceph plugin

This plugin now operates in two modes:

  • native - This mode uses the go-ceph library to communicate directly with the Ceph cluster using the native Ceph API (msgr2 protocol). This is the recommended mode for modern Ceph installations, but is only supported on Linux and starting with Ceph 16.
  • restful (deprecated) - This mode uses the Ceph RESTful API for communication. It is the default mode for backward compatibility but will not work with Ceph version 20 (Tentacle) or newer due to the removal of the mgr/restful module.

Which mode to use is determined by the value of the mode parameter (native/restful):

  • Plugins.Ceph.Default.Mode=native - set the native mode for the plugin
  • Plugins.Ceph.Sessions.<SessionName>.Mode=native - set the native mode for the named session

Note that the user credential set differs for each mode and they are not compatible with each other. The Plugins.Ceph.InsecureSkipVerify parameter is ignored in native mode because connection security is defined on the Ceph cluster side by msgr2 protocol (secure by default).

Note that the Ceph plugin for Zabbix agent 2 is now a loadable plugin and requires additional installation steps. This is due to the librados package requirement (for the native mode). See the Ceph plugin readme for details.

Test execution mode for loadable plugins

Loadable plugins can now be launched in test mode using the -t (--test) flag, passing an item key as argument.
In this mode, the plugin runs for debugging and development purposes, and plugin configuration files are ignored.