Integrating by using BMC Helix Intelligent Integrations

An organization with a huge IT infrastructure and global operations might have multiple tools to monitor and manage the performance and health of its infrastructure environment. Managing multiple and independent third-party monitoring tools might impact coherent monitoring. 

As a tenant administrator, you can use BMC Helix Intelligent Integrations to connect with third-party products (cloud-based, on-premises, or hybrid) to collect alert, event, metric, and topology data. You can view and derive actionable insights from this data in BMC Helix AIOps, BMC Helix Discovery, BMC Helix Dashboards, and BMC Helix Operations Management.

The following video (3:19) provides a high-level overview of BMC Helix Intelligent Integrations.

BMC Helix Intelligent Integrations uses REST APIs and the Webhook mechanism to communicate with a third-party product (data source).

As a tenant administrator, use BMC Helix Intelligent Integrations to configure connections with third-party products as described in the following table:

1Explore the available third-party products from which you can collect data.

Choose the BMC Helix Intelligent Integrations deployment mode and configure connections with third-party products.

3Derive actionable insights
  • View key performance indicators and entities from all the integrated products on the Overview page of BMC Helix AIOps. The consolidated summary on the Overview page helps you to quickly visualize and assess the health of your infrastructure environment. For more information, see Monitoring key performance indicators and entities Open link .
  • Monitor services and determine the most likely causes of any issue in an infrastructure environment by correlating millions of monitoring data points and analyzing the relationship between infrastructure nodes and services. For more information, see:
    • Monitoring services Open link  
    • Performing causal analysis of impacted services Open link
  • Use a centralized event view to monitor and manage events, perform event operations, and filter events. Identify actionable events from a large volume of event data by processing events in various ways. For more information, see  Monitoring events and reducing event noise. Open link .
  • Detect anomalies and eliminate false positives. Use alarm and variate policies to detect anomalies through static and dynamic thresholds. For more information, see Detecting anomalies by using static and dynamic thresholds. Open link .

Was this page helpful? Yes No Submitting... Thank you