This documentation supports the releases of BMC Helix Service Monitoring till September 2021 (21.3.03). Documentation for later versions is available in the BMC Helix AIOps documentation space. To view the documentation, select a version from the Product version menu.

Ingesting data from BMC and third-party products

An organization with a huge IT infrastructure and global operations may have multiple monitoring tools that are used to monitor and manage the performance and health of its infrastructure environment. Managing multiple and independent third-party monitoring tools may impact coherent monitoring. 

BMC Helix Service Monitoring provides you a solution that acts as a manager of managers and enables you to achieve the following:

  • View events, metrics, and topology data synchronized from multiple sources using a single interface
  • Resolve the issues impacting the service health from a single interface
  • Drill down to find out root causes that impacted the service health
  • Remediate open events associated with services and situations

BMC Helix Service Monitoring interacts with various BMC and third-party products to get events, metrics, and topology data. As a tenant administrator, you can configure these integrations as explained in the following table:

1Download and install connectorsDownload and install connectors for third-party integrations.
2Explore the available integrations
  1. Log on to BMC Helix Intelligent Integrations and click the Available integrations tab.
  2. Check the available integrations.
3Configure integrations

Configure one or more of the following integrations and start receiving data. For more information, see:

4Derive actionable insights
  • Use a centralized event view to monitor and manage events, perform event operations, and filter events. Identify actionable events from a large volume of event data by processing events in various ways. For more information, see  Monitoring events and reducing event noise. Open link

  • Detect anomalies and eliminate false positives. Use alarm and variate policies to detect anomalies through static and dynamic thresholds. For more information, see Detecting anomalies by using static and dynamic thresholds. Open link

Was this page helpful? Yes No Submitting... Thank you