23.2 enhancements and patches

Review the BMC Helix Log Analytics 23.2 enhancements for features that will benefit your organization and to understand changes that might impact your users.

VersionSaaSOn premisesFixed issuesUpdates and enhancements
23.2.02(tick)
Known and corrected issuesupdates
23.2.01(tick)
Known and corrected issuesupdates
23.2.00(tick)
Known and corrected issues23.2.00 enhancements

For updates and enhancements in the previous releases and its patches, see 23.1 enhancements and patches.

Related topics

Known and corrected issues

Deprecated and discontinued features

Enhancements and patches of all Helix products Open link

BMC applies upgrades as described in BMC Helix Upgrade policy Open link . BMC applies upgrades and patches during Maintenance windows. Open link .


The following video (1:47) provides a high-level summary of the new features and enhancements in version 23.2 of BMC Helix Log Analytics.

Watch the YouTube video to learn about the new features and enhancements in version 23.2 of BMC Helix Log Analytics.



23.2.02


Install the Linux connector by using non-root credentials

Run the Linux connector service by providing non-root credentials. Doing so ensures that the connector accesses only those files for which the non-root user has permissions.

For more information, see Installing and managing Linux connector.


Collect logs from CentOS-based applications

Collect and analyze application logs from CentOS environments by using the connector type, Linux Connector (CentOS 7.9). 

For more information, see Installing and managing CentOS connector.


Choose new event status options for alert policies

The following event status options have been added to alert policies:

  • Info
  • OK
  • Unknown 
  • Warning

For more information, see Generating alerts from logs.




23.2.01


Filter syslog messages and Windows event logs

Add filtering rules to the collection policies that you create to collect syslog messages and Windows event logs and collect only meaningful records.

For more information, see Collecting syslog messages and Collecting Windows events.




23.2.00


Detect anomalies

Detect rare and abnormal log patterns in the logs. You create alert policies to generate events that will notify you about the rare or abnormal log pattern. Alert policies use ML-based anomaly detection algorithm to identify anomalies.

For more information, see Generating alerts from logs.


Collect Windows events

Collect and analyze Windows events by creating collection policies.

For more information, see Collecting Windows events.


Collect Kubernetes logs 

Collect and analyze system and application logs of Kubernetes.

For more information, see Collecting Kubernetes logs.


Monitor logs with out-of-the-box dashboards

Operators can access the following out-of-the-box dashboards to help them track log collection statistics for Kubernetes, syslog, and Windows events.

For more information, see Visualizing logs


Access self-help resources with in-app help

In-app help is available from a movable widget on every screen. Click the self-help widget to access a product tour, interactive guides, instructions for setting up and going live, and more. In addition, you can continue to find answers to your questions in the online documentation or in our  YouTube playlist Open link .


Enrich logs

In addition to the CSV enrichment source, the DNS, GeoIP, and LDAP enrichment sources are now available to enrich the logs.

For more information, see Enriching logs.


Migrate log collection integrations from BMC Helix Developer Tools

As announced in version 23.1.02, all log collection capabilities migrated from BMC Helix Developer Tools to BMC Helix Log Analytics. If you are still using log collection integrations in BMC Helix Developer Tools, you must migrate to BMC Helix Log Analytics collection. For more information, see Statement of direction: log collection.

Was this page helpful? Yes No Submitting... Thank you

Comments