All Products
Search
Document Center

Application Real-Time Monitoring Service:Integrate Zabbix with ARMS

Last Updated:Mar 11, 2026

Zabbix generates infrastructure alerts, but managing them across multiple Zabbix instances and notification channels becomes difficult at scale. By integrating Zabbix with Application Real-Time Monitoring Service (ARMS), you can forward Zabbix alert events to a centralized alert management platform that provides deduplication, severity mapping, and flexible notification routing.

The integration uses a lightweight connector installed on your Zabbix server. The connector automatically creates a dedicated user, user group, media type, and action in Zabbix to relay alerts to ARMS.

Prerequisites

Before you begin, make sure that you have:

  • Zabbix version 5.x installed and running

  • SSH access to the Zabbix server with administrator privileges

  • Zabbix administrator credentials (username and password)

  • An Alibaba Cloud account with ARMS activated

Note

Only Zabbix version 5.x is supported.

Create a Zabbix integration in ARMS

This step generates the integration endpoint URL that the Zabbix connector uses to forward alert events.

  1. Log on to the ARMS console. In the left-side navigation pane, choose Alert Management > Integrations.

  2. On the Alert Integration tab, click Zabbix.

  3. In the Create Zabbix Integration dialog box, enter a name and description for the integration, specify the automatic recovery time, and then click Save.

    Note

    If an alert event is not triggered again within the automatic recovery time, ARMS clears the event automatically.

  4. On the Alert Integration tab, find the Zabbix integration and copy the URL from the Integration Address column. You need this URL in the next section.

    The URL of the Zabbix integration

Install the ARMS alert connector on your Zabbix server

This step installs the connector that bridges Zabbix and ARMS. The installer creates the required Zabbix resources (user, user group, media type, and action) automatically.

  1. Log on to the Zabbix server via SSH and find the alert script directory:

       cat /etc/zabbix/zabbix_server.conf | grep alert

    The path of the Zabbix script

  2. Navigate to the alert script directory, then download and extract the ARMS alert connector package:

       cd <alert-script-directory>
       wget http://arms-public.oss-cn-shanghai.aliyuncs.com/alerts/aliyunalertmanager.tgz
       tar -xzvf aliyunalertmanager.tgz
  3. Run the installer with the integration URL you copied earlier: Replace <integration-url> with the URL copied from the Integration Address column in ARMS.

       cd aliyunalertmanager/bin
       sh install.sh <integration-url>
  4. When prompted, enter the following information:

    • The Zabbix web interface URL (for example, http://your-server/zabbix)

    • The Zabbix administrator username

    • The Zabbix administrator password

Verify the integration

After installation, confirm that the connector created the following four resources in Zabbix:

Resource typeNavigation pathExpected name
UserAdministration > UsersAliyun Alert User
User groupAdministration > User groupsAliyun Alert Group (verify that Aliyun Alert User is a member)
Media typeAdministration > Media typesAliyun Alert Media
ActionConfiguration > ActionsAliyun Alert Action
Zabbix userZabbix user groupAlert media typeZabbix action

To verify end-to-end delivery, trigger a test alert in Zabbix and check whether it appears in the ARMS console under Alert Management > Alert Event History.

Note

Only alert events generated after installation are forwarded to ARMS. Pre-existing events are not reported retroactively. To customize the data reported in alerts, edit the Aliyun Alert Action action in Zabbix.

View alert events in ARMS

  1. In the ARMS console, choose Alert Management > Alert Event History.

  2. Click an alert event name to view its details.

For more information, see View historical alert events.

Customize field mappings

ARMS provides default field mappings between Zabbix alert sources and ARMS alert events. To add or modify mappings, send test data first, then configure the mapping rules.

Send test data

  1. On the Alert Integration tab, find the integration and click Edit in the Actions column.

  2. In the Event Mapping section, click Send Test Data.

  3. In the Send Test Data dialog box, paste alert content in JSON format and click Send. Sample Zabbix alert payload:

    • If the message Uploaded. No events are generated. Configure mappings based on the original data. appears, the source fields are not yet mapped. The uploaded data appears in the left pane for reference.

    • If the message Uploaded. appears, the alert was reported to the Alert Event History page.

       {
           "startat": "2021.09.09 20:13:57",
           "eventId": "16874-9756",
           "eventType": "trigger",
           "message": "/: Used space in Zabbix server value is 81 GB, triggered an alarm disk usage trigger",
           "hostname": "Zabbix server",
           "ip": "127.0.0.1",
           "severity": "Warning",
           "value": "81 GB",
           "metric": "vfs.fs.size[/,used]",
           "itemName": "/: Used space",
           "alertname": "disk usage trigger",
           "eventUrl": "http://127.0.0.1/zabbix/tr_events.php?triggerid=16874&eventid=9756"
       }
  4. Click Disable to stop the test data mode.

  5. In the left pane of the Event Mapping section, click a data record to view its details.

Configure batch processing

In the Select Root Node section, enable batch processing if the alert data contains an array node. Select the array node as the root node.

Note

Only one array node can be selected for batch processing.

Map source fields to ARMS alert fields

In the Map Source Fields to Target Fields section, click the mapping icon next to each field to choose a mapping method:

MethodDescription
DirectMaps a source field directly to an ARMS alert field.
SeriesConcatenates multiple source fields with a delimiter (special characters only) into one ARMS field.
ConditionalMaps source fields to ARMS fields only when field values meet specified conditions.
Mapping tableMaps alert source severity to ARMS severity. Available for the severity field only.

The following table lists the available ARMS alert fields:

Alert fieldDescription
alertnameCustom alert name.
severityAlert severity level. Must use the Direct mapping method.
messageAlert description, used as the notification content. Maximum 15,000 characters.
valueSample metric value.
imageUrlGrafana metrics line chart URL.
checkCheck item, such as CPU, JVM, Application Crash, or Deployment.
sourceAlert source.
classObject type that triggers the event, such as host.
serviceSource service, such as Login Service.
startatEvent start timestamp.
endatEvent end timestamp.
generatorUrlEvent details URL.

Configure event deduplication

To reduce duplicate notifications, ARMS groups events by specified fields. Events with the same value for a deduplication field are merged into one alert.

  1. In the Event Deduplication section, select the fields for deduplication.

  2. Click Deduplication Test to preview the grouping result.

    Note

    The deduplication test runs against the 10 most recent data records uploaded in the Event Mapping section. Deduplication applies only to unresolved events.

  3. Click Save.

Manage integrations

On the Alert Integration tab, you can perform the following operations:

OperationSteps
View detailsClick the integration row to open the Integration Details page.
Update keyChoose More > Update Key in the Actions column, then click OK. After updating the key, reinstall the alert connector. See Install the ARMS alert connector on your Zabbix server.
EditClick Edit in the Actions column, modify the settings, and click Save.
Enable or disableClick Enable or Disable in the Actions column.
DeleteClick Delete in the Actions column, then click OK.
Add event processing flowClick Add Event Processing Flow in the Actions column. See Work with event processing flows.
Create notification policyChoose More > Create Notification Policy in the Actions column. See Create and manage a notification policy.

What's next

Set up a notification policy to define how ARMS generates alerts and sends notifications for incoming Zabbix events. See Create and manage a notification policy.

To review alerts triggered by your notification policies, see View historical alerts.