Conversation
Readme for new OPNSense template
the template
|
there are a template similar with api http: https://github.com/sysadminbr/OPNsense-Zabbix-API-templates |
|
@burghy86 : You're right, but it was never pushed to the community templates. The template also uses Zabbix agent items. Maybe you could ask sysadminbr if they can create a pull request to the community template repository.. And they use a lot of javascript which is unnecessary (at first look). |
|
I took a look at u Template, the OpenVPN thing looks good to me, but the Cert-thing.. why I need all of this items? most important items are uuid, valid_to (with trigger), commonname, descr and maybe digest.. the rest is more than unnecessary. |
|
Hi, if possible I would be very interested in the wg, ipsec, openvpn control and also a nut control to have the alarms when the usb ups has some error or the power supply is interrupted. |
|
@colttt The idea behind the certificate details was for auditing reasons and alerting, if i. e. an certificate is created / used which doesn't match the minimum requirements. @burghy86 |
|
Hi @dkuenne ,
I thought about it and thanks for the suggestion and for your work on #695! I took a closer look at both approaches. While you were a day faster, my template already includes a much deeper set of core monitoring items (CPU, Memory, Disk, Interfaces, CARP) and, more importantly, a full set of tested triggers and discovery rules. From a technical perspective, it would be quite a lot of manual effort to migrate my refined logic and trigger sets into your PR. I believe my current PR actually provides a more 'complete' foundation for the core system monitoring right now. How about we do it the other way around? Since you’ve already started on specialized areas like OpenVPN and Certificates, we could integrate your additions into this PR (after cleanup). That way, we combine the best of both worlds—my core metrics and your additional service monitoring—without losing the work I’ve already put into the trigger logic. What do you think? |
|
@burghy86: I guess you mean monitor instead of control?! If so, since I/we don't use it at the moment we need the API endpoint and an (few) output example(s). After that we can add those features |
|
@colttt Sure, I've closed my PR and will add it to yours after it's merged. |
|
I spent some time adding Wireguard over in the other template, ironically I started a week ago but went on holiday. Would you be willing to have a look at that and potentially integrate it here? |
|
@exu-g : why are u using JS instead of build-in JSONPath functionality ? |
Sorry, I obviously meant monitoring. I use a lot of site-to-site IPsec. If I can help you with some real Opnsense APO output, please let me know. For the NUT, I also use a lot of NUT here, using many standalone NUCs connected to a UPS via USB. I can provide you with the output APIs for these too. Unfortunately, interpreting them and putting them into a Zabbix template is beyond my capabilities. The other template I've used so far controls the IPsec tunels perfectly. Maybe it can help you. |
Summary
Adds a new community template for monitoring OPNsense firewalls via the
built-in REST API using HTTP JSON agent (no Zabbix agent required).
Currently we just monitor firewall-things, no extra services like OpenVPN, Wireguard, DHCP, etc, because we don't use these services
Template details
Monitored components
firewall statistics (IPv4)
Discovery rules
Triggers included
Files
template_opnsense_by_http_json.yaml– Template fileREADME.md– Documentation with setup instructions, macro reference,and full item/trigger/discovery listing
Testing
Tested against OPNsense 25.x (Community & Business Edition).