Creating incidents from Azure Monitor alerts via BMC Helix Integration Service
Azure Monitor provides analytics and insights about your cloud and on-premises resources and applications by analyzing telemetry. Azure monitor enables you to configure alerts on multiple Azure resources such as metrics, search queries, log events, website availability and so on.
As a BMC Helix Multi-Cloud Broker tenant administrator, you can enable integration between BMC Helix Multi-Cloud Broker and Azure Monitor to create incidents in ITSM based on the following Azure Alerts:
- Metric alerts
- Activity log alerts
After the incident is created in ITSM, you can attach the affected CI and business service to categorize the incidents. For example, an incident is created in ITSM, whenever a virtual machine in Azure has CPU consumption greater than 70% and server response time more than four hours.
Before you begin
Complete all preconfiguration tasks before you configure the Azure Monitor integration.
To select the integration option for Azure Monitor
- Log in to BMC Helix Innovation Suite.
- On Workspace, click Multi-Cloud Broker.
To launch BMC Helix Multi-Cloud Broker, click Visit Deployed Application.
Tip
You can access BMC Helix Multi-Cloud Broker directly by entering the URL https://hostName:portNumber/helix/index.html#/com.bmc.dsm.mcsm/login and logging in as a tenant administrator.
- To open the configuration page, click Settings .
- Select Start Here > Quick Configuration Guide.
In the Step 1: Choose configuration tab, perform the following steps:
From the Choose configuration list, select the Helix integration service.
b. For the notification feature, under Notification, select Azure Alert to ITSM Incident, and click Next.
The Perform configurations tab displays a list of the common configurations, connectors, flows, and connector targets and processes that you need to configure as described in the next tasks.
To map Azure Monitor alert data to ITSM or BMC Helix ITSM: Smart IT
Configuring vendor data includes setting up a vendor organization and defining vendor mappings for the technology provider. The Configuration Links page provides links to both options.
Note
BMC recommends that you set up the vendor organizations before starting the BMC Helix Multi-Cloud Broker configuration. For more information about adding vendor organizations, see Performing preconfiguration tasks.
- If you have not done so already, on the Perform configurations tab page, click Manage Vendor Organizations to create or modify a vendor organization.
- To add or update the vendor mapping, on the Perform configurations tab, click Manage Vendor Metadata.
- To open the Map New Vendor page, on the Configure Vendor Metadata page, click
. - Enter a Description that makes it easy for you to identify the vendor metadata configuration.
- Select the Ticketing Technology Provider.
The Ticketing Technology Provider is the application the vendor uses to manage tickets. For example, the Ticketing Technology Provider for Azure Monitor is Azure Alerts. - Add or update the Instance name for the provider.
- Click Add Mapping .
BMC Helix Multi-Cloud Broker displays the default Instance URL , and Display Field Mapping . - To add or delete values, click { } to open the JSON editor, and modify the field mappings.
- Display Field Mapping: Map vendor ticket fields to the fields on the Smart IT console.
- Display Field Mapping: Map vendor ticket fields to the fields on the Smart IT console.
Vendor Specific section for Activity Log type alerts
Vendor Specific section for Metrics type alerts
9. From the Integration Platform list, select Integration Service.
To configure connectors for integrating ITSM and Azure Monitor with BMC Helix Multi-Cloud Broker
For each feature you selected, complete the following procedure for the connectors listed on the Configuration Links page.
To navigate to BMC Helix Integration Service, on the Configuration Links page, click Configure connectors in Integration Studio under Required Common Configurations.
You must configure the connectors listed for each feature, in addition to the connectors listed under Required Common Configuration.To enter field values, select a connector, such as ITSM, and click Configuration.
You might need to click the arrow on the ribbon in the lower section of the screen to open the Configuration pane.- To update the configuration defaults, enter the appropriate field values by referring to the list of connectors at the end of this procedure.
- To add or update the user account that is used to access the vendor application, click Accounts.
List of connectors and configuration values for integration with Azure Monitor
To configure flow triggers and field mappings between ITSM, BMC Helix Multi-Cloud Broker, and Azure Monitor
For each feature you selected, complete this procedure for the flows listed on the Configuration Links page.
To navigate to BMC Helix Integration Service, on the Configuration Links page, click Configure flows in Integration Studio under Required Common Configurations.
You need to configure the flows listed for each feature, in addition to the flows listed under Required Common Configuration.
To open the flow template page, on the Catalog tab in Integration Studio, click the flow you want to configure.
- To create a copy of the flow template, click
- Select the appropriate accounts for the end-point connectors of the selected flow.
You specify the connector accounts when configuring connectors. - To update the name of the flow that you have copied from the flow template, select My Flow, open the flow that you copied, and update the title.
Specify the trigger Conditions and Field mapping, and click OK.
For more information about trigger conditions and field mappings, see the list of flows at the end of this procedure.- Click My Flows and select the flow that you created from the flow template.
- To verify the target values for the trigger conditions and the field mappings, in the right pane, click Details.
List of flows and configuration values for integration with Azure Monitor
The out-of-the-box flow settings are based on common field mappings. You can update the trigger conditions or field mappings.
To define connector targets to enable integration with Azure Monitor
BMC preconfigures the out-of-the-box connector targets for all BMC Helix Multi-Cloud Broker features. If you want to update the connector configuration or account information, update the connector target for the feature.
Warning
Do not delete the out-of-the-box connector targets.
- To navigate to BMC Helix Innovation Suite, in the Configuration Links page, click Configure Connector Targets in Innovation Studio under Required Common Configurations.
You need to configure the connector targets listed for each feature on the Configuration Links page, in addition to the ones listed under Required Common Configuration. - Click the connector target you want to configure or click to configure a new connector target.
Enter or update the following values and save the configuration.
Field Instructions Name Enter a unique name for the configuration.
The name is associated with the process that is related to the connector you are configuring.Connector Type Select the connector type from the list of connectors available to you in BMC Helix Integration Service.
Configuration Select a configuration from the list.
For example, if you select qradar as the Connector Type, all the configurations that you have made for qradar are displayed in the Configuration list.
Profile Select a profile. For example, if you select qradar as the Connector Type, all the profiles that you have created for qradar are displayed in the Configuration list.
List of connector targets for integration with Azure Monitor
To configure Azure Alerts webhooks
- Log in to Integration Studio.
- Search for the Create Incident from Azure Alerts flow.
- Copy the WebHook URL value from the flow by clicking the Flow in Use button.
- To add a webhook to an action, follow the instructions for a basic webhook or a secure webhook.
- To configure a basic webhook, perform the following steps:
- In the Webhook panel, set Secure webhook to No.
- Paste the WebHook URL from step 3 to URI.
- Set Common Alert Schema to Yes.
- The following image shows a sample webhook action.
- To configure a secure webhook, perform the following steps:
- If you have not registered the app, register the app
here
.
After you have registered your app, you can find the Object ID in the Overview tab. You will also need Application ID and Tenant ID for configuration in the Azure Alerts connector. - In the Overview tab, copy Object ID of your registered app.
- In the Webhook panel, set Secure webhook to Yes.
- Paste the Object ID that you copied from the registered app.
- Paste the WebHook URL from step 3 to URI.
- Set Common Alert Schema to Yes.
The following image shows a sample webhook action
- If you have not registered the app, register the app
here
For more details about Azure Monitor, refer to the
Azure Monitor documentation
.
When you complete the configuration for all the components, verify that incidents are created in ITSM based on different Azure Alerts such as Metric alerts and Activity log alerts.
Comments
Log in or register to comment.