
Pair Zabbix with rConfig. Back up every device configuration. Prove compliance on demand.
rConfig integrates natively with Zabbix to pull your host inventory through the Zabbix API, back up the running configuration of every device on the schedule you choose, diff every change, and generate NIS2 or DORA evidence without duplicate inventory, without scripts, and without waiting on the engineer who originally wrote them.
Zabbix 5.0, 6.0, 7.0 LTS200+ vendor profilesOfficial partner integration
Zabbix backs up its database. It doesn’t back up your device configurations.
Open the Zabbix forum and search “config backup”. You’ll find a decade of threads from network teams stitching together bash scripts, SNMP writes, TFTP servers and cron jobs. Some of them are elegant. Most are running in production with nobody sure who last touched them.
Zabbix was never built to pull running-config from your Cisco, Juniper, Arista or Fortinet devices. That’s not a flaw. It’s a scope decision, and the Zabbix team has been pretty upfront about it. Network configuration management is its own discipline, and it lives in its own tooling category.
That’s rConfig. Vendor-agnostic. 200+ device profiles out of the box. Installed on-prem or in your private cloud. Your Zabbix hosts become rConfig devices over the Zabbix API, and every configuration on every one of them lives in rConfig’s versioned archive from that point forward.
- Zabbix database backups don't capture what's on the devices Zabbix monitors.
- SNMP-write-plus-TFTP scripts break the week you need them most.
- Oxidized solves it for some teams, but becomes fragile as the estate grows.
- Most home-grown scripts can't produce evidence an auditor will accept.
- Commercial NCM tools usually want a separate inventory, defeating the point of running Zabbix.
rConfig is the piece that completes the Zabbix stack without forcing you to rebuild the parts that already work.
Zabbix plus rConfig, in three moves.
Three capabilities that turn a monitored Zabbix estate into an audit-ready one. Every host, every configuration, every change.
Sync
Zabbix hosts become rConfig devices automatically, scoped by Zabbix host group, tag or inventory field. Add a device to Zabbix, it lands in rConfig on the next schedule. Retire a host in Zabbix, it's flagged in rConfig for review before anything breaks.Capture
Every running-config, every startup-config, every change, stored and diffable. 200+ vendors out of the box. No per-vendor plugin to maintain. No Jinja. No Python.Prove
Compliance policies run against every Zabbix-managed device. NIS2, DORA, PCI-DSS, CIS benchmarks and anything your security team writes. Evidence exports in minutes.
Zabbix watches. rConfig remembers. Together, they’re the answer to every awkward question your auditor has ever asked.
How rConfig syncs with Zabbix, step by step
Five screens. Ten minutes for a pilot group. Tag and inventory mapping that scales cleanly from one test group to a 50,000-host estate.
- 01Step 1: AuthorisePaste a Zabbix API token (preferred) or user plus password into rConfig's Integrations screen. Test Connection and Test Credentials buttons confirm reachability in seconds.
- 02Step 2: FilterChoose which Zabbix hosts to bring across. Filter by host group, host tag, Zabbix inventory field, or any combination. Most teams start with a single host group of five to ten test devices.
- 03Step 3: MapTranslate Zabbix tags, groups and inventory into rConfig vendors, templates and credentials using tag-based mapping. Set it up once, rConfig applies it on every sync thereafter.
- 04Step 4: StageTransformed devices land in rConfig's staging table for review. Idempotent: re-runs produce identical state, failures resume cleanly on the next cycle. Nothing goes to production without explicit promotion.
- 05Step 5: SyncRun it now, schedule it (hourly, daily, weekly), or trigger it from the CLI with
php artisan rconfig:integration-zabbix. Backup, diff and compliance run automatically from that point.
The integration is one-way by design. rConfig never writes to Zabbix. If inventory drifts between the two systems, Zabbix remains the source of truth and rConfig reconciles on the next sync.
Built for how Zabbix teams actually work
The jobs the NOC, the security team and the auditor each need from network configuration management. Nothing bolted on for show.
Multi-vendor configuration backup
Cisco, Juniper, Arista, Fortinet, Palo Alto, Huawei, Nokia, MikroTik, HPE, Aruba and 200 more. Hourly, daily or on demand.Change detection with a readable diff
See exactly what changed, line by line, since the last known-good version. Filter out noise like timestamps and session identifiers.NIS2, DORA and CIS compliance reporting
Write policies once, run them against every Zabbix-managed device. Export evidence your auditor can actually read.One-click configuration restore
Push a known-good configuration back to any device in under 90 seconds, with approvals and a full audit trail.Bulk configuration deployment
Apply the same template across every Zabbix host that matches a filter, in a single job with preview and rollback.Full audit trail, exportable on demand
Who changed what, when, from where. The report your auditor asks for takes minutes, not days.
Runs alongside Zabbix. Scales with it. Stays out of its way.
rConfig doesn’t poll interfaces, doesn’t graph throughput, doesn’t ingest SNMP traps. That’s Zabbix’s job, and after twenty years of open-source development Zabbix does it better than almost anything else in the category.
What rConfig does is what Zabbix doesn’t: capture configuration, track how it changes, and prove what it looked like when someone needs to know. Self-hosted on-prem, VM or bare metal, in your private cloud, or alongside your Zabbix proxy estate. Vendor-agnostic. Multi-tenant capable. Your ops team is running it inside 30 minutes on V8 Pro or Vector.
Your inventory.Your configuration.Your audit trail.
From Zabbix alert to restored configuration, in under ten minutes.
A managed service provider in the UK runs Zabbix across roughly 40,000 devices for 120 customer networks. At 02:47 on a Friday, Zabbix escalates a problem on a distribution switch at a logistics customer’s Leeds warehouse. The on-call engineer pulls up Zabbix and the interface counters show the issue clearly enough, but the diagnosis lives in rConfig: a misapplied VLAN trunk configuration pushed during a scheduled change window earlier that evening. rConfig’s diff view surfaces the exact three-line difference from the known-good configuration, and the engineer rolls back with a single click. Service is restored at 02:56. The change management ticket is closed with the diff attached as evidence.
That’s the difference between explaining an outage and preventing the next one.
NIS2 and DORA evidence, sourced from the network Zabbix is already monitoring.
If you’re in scope for NIS2 or DORA, you need two different pieces of evidence. You need to prove the network was available, and you need to prove it was configured correctly. Zabbix produces the availability evidence. rConfig produces the configuration evidence. Neither tool alone satisfies both halves of the audit.
Run both and your compliance team stops asking the NOC for screenshots at 4pm on a Friday. Policy checks run automatically, every day, against every device Zabbix knows about. When the auditor asks, the report is already waiting. If you’re running rConfig alongside Zabbix already, you likely have 80 percent of what you need to respond to a DORA operational-resilience request without pulling an engineer off on-call.
rConfig compared to Oxidized, RANCID or a home-grown Zabbix config backup script
The Opensource ICT Solutions post on blog.zabbix.com is the best public write-up of a Zabbix plus Oxidized integration. It’s the right reference if you’re going that route, and for shops with a dedicated automation engineer it works.
What Oxidized doesn’t give you: a web UI your NOC can operate on day one, pre-built multi-vendor compliance policies, commercial support with SLAs, role-based access control, SAML SSO, approval workflows, managed upgrades, and NIS2 or DORA reporting that doesn’t need a Python developer to generate.
What a home-grown script using SNMP writes doesn’t give you: any of the above, plus it’s the single point of failure nobody on the team wants to be responsible for. When the engineer who wrote it leaves, the knowledge leaves with them.
Most teams move to rConfig after they outgrow the operational cost of the open-source path. If your audit exposure has caught up with you, or if your ops manager is one departure away from losing the only person who understands how the script stack was held together, that’s usually the tipping point. Other monitoring and source-of-truth integrations (Statseeker, NetBox) follow the same pattern if your stack extends further.
The Zabbix integration, at a glance
Everything your architecture review will ask about. Share this section with your security team before the demo.
- rConfig version
- 8.0 or later (V8 Pro, Enterprise or Vector)
- Zabbix versions
- 5.0 LTS, 6.0 LTS, 7.0 LTS and all 7.x minor releases
- Deployment types
- Zabbix self-hosted, Zabbix Cloud, Zabbix Enterprise
- Authentication
- Zabbix API token (preferred) or user plus password
- Transport
- HTTPS
- Filterable fields
- Host name, host groups, host tags, Zabbix inventory fields
- Sync triggers
- Manual, scheduled, or CLI
- CLI command
php artisan rconfig:integration-zabbix- Single-host CLI
php artisan rconfig:integration-zabbix-single-device {host_id}- Data flow
- One-way, Zabbix to rConfig
- Idempotency
- Yes, re-runs produce identical state
- Logging
- Every sync logged with user, timestamp, host count, errors
- High Availability
- Supported (point rConfig at the Zabbix HA virtual IP or load balancer)
- Documentation
- docs.rconfig.com/integrations/device-sync-overview
Questions Zabbix users ask about network configuration management
See the sync running against your own Zabbix inventory.
Book 30 minutes with an rConfig engineer. We’ll point the integration at a slice of your real Zabbix estate, back up a handful of your own devices, and run a compliance report against a policy that matters to your team. No generic demo. No slide deck. No sales gate.
Listed at zabbix.com/integrations/rconfig. Supported by rConfig since 2024. Not going anywhere.