Opsview Knowledge Center

Customization

How to customise Opsview Monitor

Single Sign On (SSO) Authentication

Opsview Monitor can use LDAP and Active Directory for Single Sign On (SSO) functionality.

For information around configuration, testing, troubleshooting and more - see Section LDAP / Active Directory

Theme/White Labelling

Opsview Monitor can be themed by updating the /usr/local/nagios/share/stylesheets/custom.css file. This file is retained across upgrades, so it will not be overwritten.

The following items can be updated/modified:

  • Login page logo
  • Header logo
  • Navigation button colours
  • Login button colour
  • Background colour

An example of a customised theme is here:

/* Navigation bar and login background color */
.x-body,
.menumain,
.main_navigation,
.main_navigation .x-btn-default-toolbar-small,
.usermenudropdown .x-menu-body,
.hostgroups_hostsummary .x-panel-header-default
{ background: #243a72!important; }
/* Navigation buttons */
.searchtop .x-btn-glyph,
.menumain .x-btn-glyph,
.usermenu .x-btn-glyph,
.usermenu .x-btn-inner,
.usermenudropdown .x-menu-item-text,
.usermenudropdown .x-menu-item-glyph
{ color: white!important; }
/* Login button */
div.login-box button
{ background: #80ba01; }
/* Login logo */
.opsview-logo
{ width: 276px; height: 110px; background-image: url('../images/my_image_name.png'); margin: 2em auto; }
/* Navigation logo */
.top-toolbar-logo
{ width: 204px; height: 25px; background-image: url('../images/my_image_name.png'); background-size: 100%; }

Login and Banner images should be placed in /usr/local/nagios/share/images.

To change the logos, upload your login and navigation logos to:

  • Login page logo: /usr/local/nagios/share/images/my_image_name.png - width: 276 x height: 110.
  • Navigation logo: /usr/local/nagios/share/images/my_image_name.png - width: 204 x height: 25.

The image sizes will rescale if they are not exact.

Note: You may need to clear the browser cache for the image to be seen.

Examples

Using modified images and the above CSS file, we can have a system that looks like:

Login page

Hashtags page

Upgrading

If you are upgrading to Opsview Monitor 5.x, you will be prompted to either override your custom.css file or keep the existing one. If you wish to keep a copy of your custom.css file, please make a copy using the command:

cp /usr/local/nagios/share/stylesheets/custom.css /usr/local/nagios/share/stylesheets/custom.css.bak

Once backed up, you will need to press 'Y' to update the file, as below:

Configuration file '/usr/local/nagios/share/stylesheets/custom.css'
 ==> Modified (by you or by a script) since installation.
 ==> Package distributor has shipped an updated version.
   What would you like to do about it ?  Your options are:
    Y or I  : install the package maintainer's version
    N or O  : keep your currently-installed version
      D     : show the differences between the versions
      Z     : start a shell to examine the situation
 The default action is to keep your current version.
*** custom.css (Y/I/N/O/D/Z) [default=N] ? Y

If you do not update the file, your old custom.css may cause problems with how the User Interface is rendered.

Apache SSL Config

As part of Opsview's configuration, Apache can be configured to use an SSL certificate. If you are planning to use a self signed certificate there are numerous guides available to follow and create a self signed certificate e.g. http://www.akadia.com/services/ssh_test_certificate.html or https://letsencrypt.org.

In order to set up Apache to use SSL, the following steps are required. Before starting, we recommend that you have your SSL certificate and Server key available:

  1. Change the /usr/local/opsview-web/etc/apache_proxy_ssl.conf and add the path to where the certificates are stored on your server. By default we recommend that you store the server.crt and server.key file in the directory mentioned in the path.By default the SSL certificates are stored at the location specified in /usr/local/opsview-web/etc/apache_proxy_ssl.conf

apache_proxy_ssl.conf

SSLCertificateFile /usr/local/opsview-web/etc/ssl/server.crt
SSLCertificateKeyFile /usr/local/opsview-web/etc/ssl/server.key
  1. The /etc/apache2/sites-available/opsview.conf file contents should be as mentioned below. You will require sudo access to finish this task. The /etc/apache2/sites-available/opsview.conf file contents should be as mentioned below.

opsview.conf

<VirtualHost *:443>
Include /usr/local/opsview-web/etc/apache_proxy_ssl.conf
</VirtualHost>

You will require sudo access to finish this task. This file may be located at different places depending on the OS; some common directory paths are mentioned below:

Debian/Ubuntu: /etc/apache2/sites-available/opsview.conf or /etc/apache2/sites-available/opsview depending on the version of Apache you are using (2.4 or 2.2).

Centos/Redhat: /etc/httpd/conf.d/opsview.conf

  1. For debian/ubuntu make sure mod_ssl is enabled by issuing the command a2enmod ssl as it is not enabled by default.

  2. For RPMs make sure the mod_ssl package is installed as it is not installed by default.

  3. For Centos7 make sure that if there is a file called ssl.conf.disabled in the /etc/httpd/conf.d directory, it is renamed as ssl.conf. If it is not, the GUI will not be accessible

  4. Restart apache and open the Opsview Monitor GUI in a browser with "https://" at the start of the URL.

Notes: /usr/local/opsview-web/etc/apache_proxy_ssl.conf is overwritten on upgrades.

Customization

How to customise Opsview Monitor