The zabbix-ldap-sync script is used for keeping your Zabbix users in sync with an LDAP directory server.
It can automatically import existing LDAP groups and users into Zabbix, thus making it easy for you to keep your Zabbix users in sync with LDAP.
Maintained by Marc Schöchlin ms@256bit.org
This project moved to https://github.com/zabbix-tooling/zabbix-ldap-sync to ease collaboration of developers. You can switchover your current git clone by executing the follwing command:
git remote set-url origin git@github.com:zabbix-tooling/zabbix-ldap-sync.git # or
git remote set-url origin https://github.com/zabbix-tooling/zabbix-ldap-sync.git
You also need to have your Zabbix Frontend configured to authenticate against an AD/LDAP directory server. (using http or ldap-auth)
Check the official documentation of Zabbix on how to configure Zabbix to authenticate against an AD/LDAP directory server
git clone https://github.com/zabbix-tooling/zabbix-ldap-sync.git
cd zabbix-ldap-sync
sudo apt-get install python-dev virtualenv libpython3.*-dev libldap2-dev libsasl2-dev
virtualenv -p python3 venv
sudo yum install python3-devel openldap-devel
python3 -m venv venv
source venv/bin/activate
pip install -r requirements.txt
./zabbix-ldap-sync -h
In order to use the zabbix-ldap-sync script we need to create a configuration file describing the various LDAP and Zabbix related config entries.
RECOMMENDATION: Use a ldap client like Apache Directory Studio to test the ldap connection, filters and to inspect available attributes. The flag --verbose
helps to get the ldap filters calculated by the script.
type
- Select type of ldap server, can be activedirectory
or openldap
uri
- URI of the LDAP server, including portbase
- Base Distinguished Name
binduser
- LDAP user which has permissions to perform LDAP searchbindpass
- Password for LDAP usergroups
- LDAP groups to sync with Zabbix
<goupname>:<numeric role id/name>
)media
- Name of the LDAP attribute of user object, that will be used to set Send to
property of Zabbix user media. If entry is not used, no media synchronizastion is made. Common value is mail
.ignore_tls_errors
- If set to true, tls connection problems are ignored (you should use this only for testing)filtergroup
= The ldap filter to get group in ActiveDirectory mode, by default (&(objectClass=group)(name=%s))
filteruser
= The ldap filter to get the users in ActiveDirectory mode, by default (objectClass=user)(objectCategory=Person)
filterdisabled
= The filter to get the disabled user in ActiveDirectory mode, by default (!(userAccountControl:1.2.840.113556.1.4.803:=2))
filtermemberof
= The filter to get memberof in ActiveDirectory mode, by default (memberOf:1.2.840.113556.1.4.1941:=%s)
groupattribute
= The attribute used for membership in a group in ActiveDirectory mode, by default member
userattribute
= The attribute for users in ActiveDirectory mode sAMAccountName
type
= The storage mode for group and users can be posix
or groupofnames
filtergroup
= The ldap filter to get group in OpenLDAP mode, by default (&(objectClass=posixGroup)(cn=%s))
filteruser
= The ldap filter to get the users in OpenLDAP mode, by default (&(objectClass=posixAccount)(uid=%s))
groupattribute
= The attribute used for membership in a group in OpenLDAP mode, by default memberUid
userattribute
= The attribute for users in openldap mode, by default uid
truncatedn
- If set to true the distinguished name (DN) will be truncated to the first component (by default false). Group members are usually defined as full-path-DN
. If your ldap server just uses the login
names to reference group members (i.e. FreeIPA) you can use this functionality to solve problems with broken searches. Example: uid=testuser,cn=users,cn=accounts,dc=example,dc=com
cut to uid=testuser
server
- Zabbix URLusername
- Zabbix username. This user must have permissions to add/remove users and groups. Typically, this would be Zabbix Admin
account.password
- Password for Zabbix userapitoken
- Zabbix API token (Available since Zabbix 5.4)auth
- can be http
(for basic auth), webform
(for regular form based login) or token
(for API token).
If token
is used, username
and password
are ignored. Likewise, apitoken
is ignored for http
and webform
.alldirusergroup
- A group in Zabbix where to put all users created from the ldap directory.ignore_tls_errors
- If set to true, tls connection problems are ignored (you should use this only for testing)Allows to override various properties for Zabbix users created by script. See User object in Zabbix API documentation for available properties. If section/property doesn't exist, defaults are:
role = User role
- User numeric role id or role name, for zabbix <= 4.4 use "type" with a suitable value (i.e. "1")show_password
- Display passwords. Possible values: true
or false
Allows to override media type and various properties for Zabbix media for users created by script.
decription
- Description of Zabbix media (Email
, Jabber
, SMS
, etc...). This entry is optional, default value is Email
.You can configure additional properties in this section. See Media object in Zabbix API documentation for available properties. If this section/property doesn't exist, defaults fro additional properties are:
active = 0
- Whether the media is enabled. Possible values: 0
- enabled; 1
- disabled.period = 1-7,00:00-24:00
- Time when the notifications can be sent as a time period.onlycreate = true
- Process media only on newly created users if this is set to true
. severity = Disaster,High,Average,Warning
- A list of severities to send notifications about, seperated by comma (alternative: the numeric bitmap value).See example config file, create a copy of this and modify it according to your needs.
Usage: zabbix-ldap-sync [-lsrwdn] [--verbose] -f <config>
zabbix-ldap-sync -v
zabbix-ldap-sync -h
Options:
-h, --help Display this usage info
-v, --version Display version and exit
-l, --ldap-accountids Do not make changes to ldap account id names
-s, --skip-disabled Skip disabled AD users
-r, --recursive Resolves AD group members recursively (i.e. nested groups)
-w, --wildcard-search Search AD group with wildcard (e.g. R.*.Zabbix.*) - TESTED ONLY with Active Directory
-d, --delete-orphans Delete Zabbix users that don't exist in a LDAP group
-a, --remove-absent Remove Zabbix users from group that don't exist in a LDAP group
-n, --no-check-certificate Don't check Zabbix server certificate
--verbose Print debug message from ZabbixAPI
--dryrun Just simulate zabbix interaction
-f <config>, --file <config> Configuration file to use
Now that we have the above mentioned configuration file created, let's import our groups and users from LDAP to Zabbix.
$ ./zabbix-ldap-sync -f /path/to/zabbix-ldap.conf
Once the script completes, check your Zabbix Frontend to verify that users are successfully imported.
To sync different LDAP groups with different options, create separate config file for each group and run zabbix-ldap-sync
:
$ ./zabbix-ldap-sync -f /path/to/zabbix-ldap-admins.conf
$ ./zabbix-ldap-sync -f /path/to/zabbix-ldap-users.conf
You would generally be running the above scripts on regular basis, say each day from cron(8)
in order to make sure your Zabbix system is in sync with LDAP.
Create the config directory:
$ mkdir config
Copy the config to directory with zabbix-ldap.conf
name, example:
$ cp ./zabbix-ldap.conf.example config/zabbix-ldap.conf
You can change the docker-compose volume mount point or config file name on docker-compose.yml
Finally run the docker-compose:
$ docker-compose up
To run on detached mode use the param -d
:
$ docker-compose up -d
This tool works for years now, but from a view of serious software development this piece of code still needs major refactorings. Major refactoring tends to break things which are not available in my testing environment.
Starting from the original implementation, some things have already been improved, extended and simplified. In my busy everyday life, I have unfortunately not yet found time for the following topics.
Contributions are very welcome, especially for the following topics: