Configuring alarm policies
As a tenant administrator, you can create, edit, view, and delete alarm policies. You can also view a list of alarm policy conflicts.
To configure alarm policies
The following video (6:02) illustrates how you configure alarm policies.
Important: Required permission for the custom restricted-user role
Make sure that the monitor.external_entity_types.view permission is assigned to a custom restricted-user role, so that the associated users can view external entities while configuring alarm policies.
Note that the video displays screens from an earlier version, however, the information provided in the video is still relevant to the current version of the product.
To create an alarm policy
While creating an alarm policy, you can view and select metrics for dynamic monitor types. For this, ensure that monitor instances are available for a device on the Devices > Device Details > Monitors tab.
On the Configuration > Alarm Policies page, click Create, and do the following:
- Specify a unique name and an optional description.
- Add a unique precedence number to the policy.
You can add a custom value in this field, or use the arrows to increase or decrease the value. For more information, see .Alarm policies vOct_2021. Create the conditions based on which the alarm will be generated.
- (Optional) Select Enable Policy.
You can enable or disable the policy any time from the Alarm Policies page. - Save the policy.
Can I create a new policy using an existing policy?
You can create a new policy quickly by copying an existing policy and editing the configurations. For more information, see copying an alarm policy.
To edit an alarm policy
On the Configuration > Alarm Policies page:
- Do one of the following:
- Select the policy and click Edit.
- From the Actions menu of a policy, select Edit.
- Change the configuration details provided while creating the policy and click Save.
To view conflicting alarm policies
To view a list of the alarm policies that have the same severity defined for the same metric, go to Configuration > Alarm Policies and click Check policy conflicts. A PDF file with the list of conflicting alarm policies is downloaded.
Important: For Chinese (Simplified), use web browsers to view the PDF
If your language is set to Chinese (Simplified), use web browsers such as Microsoft Edge, Mozilla Firefox, or Google Chrome to view the PDF. Do not use Adobe Acrobat Reader to view the PDF. You can also use any other PDF readers.
To copy an alarm policy
On the Configuration > Alarm Policies page:
- Click the action menu of the policy that you want to copy and select Copy.
The Create Alarm Policy page is displayed with the configurations of the copied policy. - Modify the configurations according to your requirements to create a new policy quickly.
- (Optional) Select Enable Policy.
You can enable or disable the policy any time from the Alarm Policies page. - Save the policy.
To view the list of alarm policies
On the Configuration > Alarm Policies page, view the list of alarm policies.
By default, the policies are sorted by Name. To sort on a different column, click the column heading.
To enable or disable an alarm policy
On the Configuration > Alarm Policies page, do one of the following:
- Select the policy and click Enable or Disable.
- From the Actions menu of a policy, select Enable or Disable.
- Edit the policy and select or clear the Enable Policy check box.
What happens if I enable or disable a policy?
- What happens when I disable an enabled policy?
All alarms that are created based on the policy are closed. - What happens when I enable a disabled policy?
New alarms are created based on the policy criteria with new event IDs.
To delete an alarm policy
On the Configuration > Alarm Policies page, do one of the following:
- Select one or more policies and click Delete.
- From the Actions menu of a policy, select Delete, and click Yes.
What happens to an open alarm?
In the policy post-trigger actions, if you have specified that the alarm must not be closed, such alarm events are automatically closed if they are not updated for more than the period specified in the retention policy. All closed events are automatically deleted from the system as per the retention policy. However, if you delete such a policy or the PATROL Agent associated with such an alarm is deleted, the alarm is automatically closed.
For more information about the retention policy, see
BMC Helix Operations Management service
.
Comments
Log in or register to comment.