2021 enhancements

Review the BMC Helix Operations Management enhancements made available during 2021 for features that will benefit your organization and to understand changes that might impact your users.

May 1, 2021

View thresholds for Multi Instances alarm policies

You can view thresholds for alarm policies that are configured with the Multi Instances option.

For more information, see Working with devices.

April 22, 2021

Provide a separator for the concatlist function  

While using the concatlist function in an advanced or time-based enrichment policy, you can specify a separator to separate portions of the new string.

For more information, see Functions for advanced enrichment and time-based enrichment.

Examples for using advanced enrichment functions

You can refer to examples documented for each of the functions. These examples can help you better understand how to derive value by using functions in the advanced enrichment and time-based enrichment policies. 

For more information, see Functions for advanced enrichment and time-based enrichment.

March 20, 2021

Integrate with BMC Helix AIOps to monitor services and investigate situations 

BMC Helix AIOps  is a multi-layered technology platform that leverages big data to automate and enhance IT operations through analytics, artificial intelligence (AI), and machine learning (ML). It collects events, incidents, metrics, services, and analytics information from various BMC and third-party products. BMC Helix AIOps automatically detects and reacts to issues in real-time, and also provides traditional historical analytics.

BMC Helix AIOps is an add-on solution for BMC Helix Operations Management.

For more information, see  BMC Helix AIOps.

Access product features from the common navigation bar

A common navigation bar is now implemented in BMC Helix Operations Management for ease of use. 

You can use the common navigation bar to:

  • Access the MonitoringConfiguration, and Administration menu options
  • Switch between your licensed applications by using the Application switcher icon . For more information, see  Product overview.
  • Access user-level functions by using the User icon 
    • API Keys to create API keys for programmatically accessing the product. For more information, see  Setting up user-level API keys.
    • User Profile to view and edit your profile information. For more information, see  Viewing user profile information.
    • User Preferences to view and edit your preferences. For more information, see User preferences.

Search the logs and fetch log fields by using API endpoints

You can search the logs and also fetch the list of fields in logs by using the following endpoints added to the  BMC Helix Log AnalyticsREST API:

  • mapping 
  • msearch 

For more information, see Ingesting and retrieving logs with REST APIs.

Configure blackout policies by using API endpoints

You can configure blackout policies by using API endpoints. For more information, see Configuring blackout policies with REST APIs.

Aggregate events by using correlation policies

You can aggregate multiple events by configuring correlation policies. For more information, see Correlating events.

March 01, 2021

Use the StringMatch function for advanced enrichment

You can now use the StringMatch function while creating time-based and advanced enrichment policies. For more information, see Functions for advanced enrichment and time-based enrichment.

Enrich events with updated slots

The following slots are now available for event enrichment:

  • object
  • object_class
  • _repeat_count

For more information, see Event classes and slots.

January 15, 2021

Copy alarm policies

You can copy existing alarm policies and edit them to create new policies quickly. For more information, see Configuring alarm policies.

Enable or disable alarm policies

You can enable or disable alarm policies. For more information, see Configuring alarm policies.

Set alarm policy precedence

You can set policy precedence to control conflicting or overlapping policy configurations. For more information, see Alarm policies.

Filter multiple instances in alarm policies

You can define multiple filter conditions by using parameters, such as agent tag name, hostname, instance name, port, and so on while selecting multiple instances in alarm policies. For more information, see Configuring alarm policies.

Was this page helpful? Yes No Submitting... Thank you