Skip to content

Download and run AutoPilot CV

Run OpsMx as a Container

Detailed below are the steps to turn on continuous verification for a dockerized deployment setup.

1. Download OpsMx from DockerHub

Download the latest OpsMx docker image from the dockerhub ( The ID of the image is:

To pull the image, run

docker pull

2. Allocate a Volume for Persistent Storage

Allocate a volume on the VM to store data beyond the lifecycle of the container.

docker volume create opsmxdata

3. Download Database image from DockerHub

Download the latest Database docker image from the dockerhub ( The ID of the image is:

To pull the image, run

docker pull

4. Run Database on a pre-specified local IP

To ensure data lives as a separate module, the database is bound to a local IP - and our application connects to this container via this IP. To run this DB:

 docker run -itd -p 5432:5432 --add-host=database: -v opsmxdata:/var/lib/postgresql 

5. Run OpsMx on Docker linked to Database

Run the OpsMx image on a machine on which docker is installed OpsMx requires ports 8090, 9090 and 8161 to be open. Ensure these are opened in the VM and in docker

Also, point the volume created to the Database of OpsMx to ensure the durability of the data.


 docker run -itd -p 8090:8090 -p 9090:9090 -p 8161:8161 --add-host=database: 

6. Verify the Container

Check whether this docker image is running as a container, via: docker ps This should show up a running container with a container id of opsmx11/autopilot:v0.9.11.201902182129

To start the container:

 docker exec -it (containerid) /bin/bash 


(containerid): Get the containerid via: docker ps

7. Integration with LDAP


If the Auth provider is not LDAP, then skip this step

If the Auth provider is LDAP then the LDAP server details to be configured in the global properties file. After deploying the container step, check the process id.

    sudo docker ps

Using the container Id, enter into the container

    sudo docker exec -it <container_id> /bin/bash
    Example : sudo docker exec -it a9ce223c5e45 /bin/bash

Edit opsmx global properties file to enter the ldap details

    sudo vi /opt/opsmx/

Edit the last few properties related to LDAP and point it to the right ldap instance.

ldap login attributes


ldap.url=ldap://:389 (example : ldap://

ldap.base.dn= (example : cn=Users,dc=local,dc=opsmx,dc=com)


  1. isLdapAuthEnabled: Enable the isLdapAuthEnabled flag to true. This will ensure the authentication is done against the given ldap server
  2. ldap.url: Set this to the ldap server ip
  3. ldap.base.dn: Set the base dn to the distinguished name of the realm under which the users present would be authenticated
  4. ldap.user.filter.pattern: Set the objectclass which represents the user (example:person or user)

8. Access the Login Page

To access the UI for login and registration -


This completes the setup and configuration of OpsMx container.

Signup & Login

To access the UI for login and registration -


1. Signup a new User


If the user is authenticated skip this step


2. Login with this new User


Configuring Cloud Credentials


This is only required if data is being pulled directly from the container/VM. Not mandatory.

If you are deploying your applications to Kubernetes, AWS or GCP, enable read access to the OpsMx Analysis platform

To enable read access, perform the following tasks

Step 1: Click on “SETUP” from the Main menu

Step 2: Click on “Deployment Credentials” tab

Step 3: Click on “ADD” Button. Currently, OpsMx supports “Kubernetes” and “AWS” or “GCP” providers.

Step 4: For “Kubernetes” ,enter account name in textbox then upload the appropriate kubernetes credentials file by clicking on Browse and Upload Buttons.


Step 5: Configure the Cloud Read credentials

For enabling AWS cloud, specify the Access Key ID, Secret access key ID and the AWS Region (e.g., US-West). Check out how to generate AWS access credentials section for help with creating keys with needed permissions.

For enabling Google Cloud Platform, upload the appropriate credentials file.

Step 6: Save the credentials.

For Saving the Cloud Credentials, when it Uploads it automatically saved.

To delete a saved credential, click on the Delete link under Action box.

Configuring Monitoring Credentials

OpsMx Analysis Platform needs to be configured to access the monitoring metric store for the deployments to be able to analyze the services. Following are the monitoring metric store and log analysis methods supported

  1. Elastic Search

  2. AWS Cloud Watch

  3. GCP Stack Driver

  4. Newrelic

  5. Prometheus

  6. Datadog

Logs and Metrics: What are they, and how do they help me?

Before trying to understand, in detailed about logs & metrics. Let’s try to understand individually about logs and Metrics.

What are logs?

A log message is a system generated set of data when an event has happened to describe the event. In a log message is the log data. Log data are the details about the event such as a resource that was accessed, who accessed it, and the time. Each event in a system is going to have different sets of data in the message.

What are Metrics?

While logs are about a specific event, metrics are a measurement at a point in time for the system. This unit of measure can have the value, timestamp, and identifier of what that value applies to (like a source or a tag). Logs may be collected any time an event takes place, but metrics are typically collected at fixed-time intervals. These are referred to as the resolution.

Do we need both Logs & Metrics?

Yes, because each has its own importance. A log captures the information that is related to an event in the system. Whereas captures the measurement of the health of a system, if there is an impact caused due to the event.

How does Elasticsearch work?

We can send data in the form of JSON documents to Elasticsearch using the API or ingestion tools such as Logstash and Amazon Kinesis Firehose. Elasticsearch automatically stores the original document and adds a searchable reference to the document in the cluster’s index. You can then search and retrieve the document using the Elasticsearch API. You can also use Kibana, an open-source visualization tool, with Elasticsearch to visualize your data and build interactive dashboards.

Is Elasticsearch free?

Yes, Elasticsearch is a free, open source software. You can run Elasticsearch on-premises, on Amazon EC2, or on Amazon Elasticsearch Service. With on-premises or Amazon EC2 deployments, you are responsible for installing Elasticsearch and other necessary software, provisioning infrastructure, and managing the cluster. Amazon Elasticsearch Service, on the other hand, is a fully managed service, so you don’t have to worry about time-consuming cluster management tasks such as hardware provisioning, software patching, failure recovery, backups, and monitoring.

In this part of the document, lets explore the process to enable New Relic & Elastic Search

To enable read access to the monitoring metric store, perform the following tasks

Step 1: Click on “SETUP” from the Main menu

Step 2: Click on “Monitoring Credentials” tab

Step 3: Click on the “ADD”. Currently, OpsMx support AWS CloudWatch, GCP StackDriver, Newrelic, Prometheus, Elasticsearch and Datadog monitoring tools.

Configuring Monitoring Credentials

Step 4: Configure the Monitoring Credentials

For enabling Newrelic, specify the Account Name, Application Name, Application key.

For enabling Elastic Search, specify the following details Account Name, End Point, Username, Password and Scope Value.

For enabling Prometheus, specify the Account Name, End Point, Username and Password.

For enabling AWS CloudWatch, specify the Access Key ID, Secret access key ID and the AWS Region (e.g., US-West).

For enabling Google Cloud Platform StackDriver, upload the appropriate credentials file.

For enabling Datadog, specify the API key and Application key.

Step 5: Save the monitoring credentials.

For Saving the Monitoring Credentials continue by clicking on “SAVE AND GO TO NEXT PAGE” Button.

To delete a saved credential, click on the Delete link under Action box.


Add Auth-Token, Username and Passwords wherever applicable.


Scope refers to the key used to retrive a unique entity from the monitoring provider. An example for Elastic-Search is provided below.