Pair Zabbix with rConfig. Back up every device configuration. Prove compliance on demand.

rConfig integrates natively with Zabbix to pull your host inventory through the Zabbix API, back up the running configuration of every device on the schedule you choose, diff every change, and generate NIS2 or DORA evidence without duplicate inventory, without scripts, and without waiting on the engineer who originally wrote them.

Zabbix 5.0, 6.0, 7.0 LTS200+ vendor profilesOfficial partner integration

01 · The gap

Zabbix backs up its database. It doesn’t back up your device configurations.

Open the Zabbix forum and search “config backup”. You’ll find a decade of threads from network teams stitching together bash scripts, SNMP writes, TFTP servers and cron jobs. Some of them are elegant. Most are running in production with nobody sure who last touched them.

Zabbix was never built to pull running-config from your Cisco, Juniper, Arista or Fortinet devices. That’s not a flaw. It’s a scope decision, and the Zabbix team has been pretty upfront about it. Network configuration management is its own discipline, and it lives in its own tooling category.

That’s rConfig. Vendor-agnostic. 200+ device profiles out of the box. Installed on-prem or in your private cloud. Your Zabbix hosts become rConfig devices over the Zabbix API, and every configuration on every one of them lives in rConfig’s versioned archive from that point forward.

  • Zabbix database backups don't capture what's on the devices Zabbix monitors.
  • SNMP-write-plus-TFTP scripts break the week you need them most.
  • Oxidized solves it for some teams, but becomes fragile as the estate grows.
  • Most home-grown scripts can't produce evidence an auditor will accept.
  • Commercial NCM tools usually want a separate inventory, defeating the point of running Zabbix.

rConfig is the piece that completes the Zabbix stack without forcing you to rebuild the parts that already work.

02 · Zabbix plus rConfig · Three moves

Zabbix plus rConfig, in three moves.

Three capabilities that turn a monitored Zabbix estate into an audit-ready one. Every host, every configuration, every change.

  • Sync

    Zabbix hosts become rConfig devices automatically, scoped by Zabbix host group, tag or inventory field. Add a device to Zabbix, it lands in rConfig on the next schedule. Retire a host in Zabbix, it's flagged in rConfig for review before anything breaks.
  • Capture

    Every running-config, every startup-config, every change, stored and diffable. 200+ vendors out of the box. No per-vendor plugin to maintain. No Jinja. No Python.
  • Prove

    Compliance policies run against every Zabbix-managed device. NIS2, DORA, PCI-DSS, CIS benchmarks and anything your security team writes. Evidence exports in minutes.

Zabbix watches. rConfig remembers. Together, they’re the answer to every awkward question your auditor has ever asked.

03 · How it works · 5 steps

How rConfig syncs with Zabbix, step by step

Five screens. Ten minutes for a pilot group. Tag and inventory mapping that scales cleanly from one test group to a 50,000-host estate.

  1. 01Step 1: Authorise
    Paste a Zabbix API token (preferred) or user plus password into rConfig's Integrations screen. Test Connection and Test Credentials buttons confirm reachability in seconds.
  2. 02Step 2: Filter
    Choose which Zabbix hosts to bring across. Filter by host group, host tag, Zabbix inventory field, or any combination. Most teams start with a single host group of five to ten test devices.
  3. 03Step 3: Map
    Translate Zabbix tags, groups and inventory into rConfig vendors, templates and credentials using tag-based mapping. Set it up once, rConfig applies it on every sync thereafter.
  4. 04Step 4: Stage
    Transformed devices land in rConfig's staging table for review. Idempotent: re-runs produce identical state, failures resume cleanly on the next cycle. Nothing goes to production without explicit promotion.
  5. 05Step 5: Sync
    Run it now, schedule it (hourly, daily, weekly), or trigger it from the CLI with php artisan rconfig:integration-zabbix. Backup, diff and compliance run automatically from that point.

The integration is one-way by design. rConfig never writes to Zabbix. If inventory drifts between the two systems, Zabbix remains the source of truth and rConfig reconciles on the next sync.

04 · Capabilities · 6 core jobs

Built for how Zabbix teams actually work

The jobs the NOC, the security team and the auditor each need from network configuration management. Nothing bolted on for show.

  • Multi-vendor configuration backup

    Cisco, Juniper, Arista, Fortinet, Palo Alto, Huawei, Nokia, MikroTik, HPE, Aruba and 200 more. Hourly, daily or on demand.
  • Change detection with a readable diff

    See exactly what changed, line by line, since the last known-good version. Filter out noise like timestamps and session identifiers.
  • NIS2, DORA and CIS compliance reporting

    Write policies once, run them against every Zabbix-managed device. Export evidence your auditor can actually read.
  • One-click configuration restore

    Push a known-good configuration back to any device in under 90 seconds, with approvals and a full audit trail.
  • Bulk configuration deployment

    Apply the same template across every Zabbix host that matches a filter, in a single job with preview and rollback.
  • Full audit trail, exportable on demand

    Who changed what, when, from where. The report your auditor asks for takes minutes, not days.
05 · Deployment · Runs alongside Zabbix

Runs alongside Zabbix. Scales with it. Stays out of its way.

rConfig doesn’t poll interfaces, doesn’t graph throughput, doesn’t ingest SNMP traps. That’s Zabbix’s job, and after twenty years of open-source development Zabbix does it better than almost anything else in the category.

What rConfig does is what Zabbix doesn’t: capture configuration, track how it changes, and prove what it looked like when someone needs to know. Self-hosted on-prem, VM or bare metal, in your private cloud, or alongside your Zabbix proxy estate. Vendor-agnostic. Multi-tenant capable. Your ops team is running it inside 30 minutes on V8 Pro or Vector.

Your inventory.Your configuration.Your audit trail.

06 · In production · MSP incident walkthrough

From Zabbix alert to restored configuration, in under ten minutes.

A managed service provider in the UK runs Zabbix across roughly 40,000 devices for 120 customer networks. At 02:47 on a Friday, Zabbix escalates a problem on a distribution switch at a logistics customer’s Leeds warehouse. The on-call engineer pulls up Zabbix and the interface counters show the issue clearly enough, but the diagnosis lives in rConfig: a misapplied VLAN trunk configuration pushed during a scheduled change window earlier that evening. rConfig’s diff view surfaces the exact three-line difference from the known-good configuration, and the engineer rolls back with a single click. Service is restored at 02:56. The change management ticket is closed with the diff attached as evidence.

That’s the difference between explaining an outage and preventing the next one.

07 · NIS2, DORA, compliance evidence

NIS2 and DORA evidence, sourced from the network Zabbix is already monitoring.

If you’re in scope for NIS2 or DORA, you need two different pieces of evidence. You need to prove the network was available, and you need to prove it was configured correctly. Zabbix produces the availability evidence. rConfig produces the configuration evidence. Neither tool alone satisfies both halves of the audit.

Run both and your compliance team stops asking the NOC for screenshots at 4pm on a Friday. Policy checks run automatically, every day, against every device Zabbix knows about. When the auditor asks, the report is already waiting. If you’re running rConfig alongside Zabbix already, you likely have 80 percent of what you need to respond to a DORA operational-resilience request without pulling an engineer off on-call.

08 · Comparison · Oxidized, RANCID, home-grown

rConfig compared to Oxidized, RANCID or a home-grown Zabbix config backup script

The Opensource ICT Solutions post on blog.zabbix.com is the best public write-up of a Zabbix plus Oxidized integration. It’s the right reference if you’re going that route, and for shops with a dedicated automation engineer it works.

What Oxidized doesn’t give you: a web UI your NOC can operate on day one, pre-built multi-vendor compliance policies, commercial support with SLAs, role-based access control, SAML SSO, approval workflows, managed upgrades, and NIS2 or DORA reporting that doesn’t need a Python developer to generate.

What a home-grown script using SNMP writes doesn’t give you: any of the above, plus it’s the single point of failure nobody on the team wants to be responsible for. When the engineer who wrote it leaves, the knowledge leaves with them.

Most teams move to rConfig after they outgrow the operational cost of the open-source path. If your audit exposure has caught up with you, or if your ops manager is one departure away from losing the only person who understands how the script stack was held together, that’s usually the tipping point. Other monitoring and source-of-truth integrations (Statseeker, NetBox) follow the same pattern if your stack extends further.

09 · Technical specifications

The Zabbix integration, at a glance

Everything your architecture review will ask about. Share this section with your security team before the demo.

rConfig version
8.0 or later (V8 Pro, Enterprise or Vector)
Zabbix versions
5.0 LTS, 6.0 LTS, 7.0 LTS and all 7.x minor releases
Deployment types
Zabbix self-hosted, Zabbix Cloud, Zabbix Enterprise
Authentication
Zabbix API token (preferred) or user plus password
Transport
HTTPS
Filterable fields
Host name, host groups, host tags, Zabbix inventory fields
Sync triggers
Manual, scheduled, or CLI
CLI command
php artisan rconfig:integration-zabbix
Single-host CLI
php artisan rconfig:integration-zabbix-single-device {host_id}
Data flow
One-way, Zabbix to rConfig
Idempotency
Yes, re-runs produce identical state
Logging
Every sync logged with user, timestamp, host count, errors
High Availability
Supported (point rConfig at the Zabbix HA virtual IP or load balancer)

Questions Zabbix users ask about network configuration management

Ten common questions from engineers evaluating the Zabbix integration. If yours isn't here, ask it on the demo call.

See the sync running against your own Zabbix inventory.

Book 30 minutes with an rConfig engineer. We’ll point the integration at a slice of your real Zabbix estate, back up a handful of your own devices, and run a compliance report against a policy that matters to your team. No generic demo. No slide deck. No sales gate.

Listed at zabbix.com/integrations/rconfig. Supported by rConfig since 2024. Not going anywhere.

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.

By clicking "Accept", you agree to our use of cookies.

Learn more