Information
Important This documentation space contains information about the SaaS version of Automation Console. If you are using the on-premises version of Automation Console, see TrueSight Automation Console 24.3

Deploying BMC Helix Automation Console on-premises by using the BMC Helix ITOM installer


Information
Important

This information applies only to TrueSight Automation Console (on-premises) users who want to enable or access features available in BMC Helix Automation Console (SaaS).

Deploy BMC Helix Automation Console as part of the BMC Helix IT Operations Management on-premises deployment and use it to identify, analyze, and remediate missing patches, vulnerabilities, and compliance violations in your environment. 
By using this method, you can keep data sources on their on-premises networks, yet securely use that on-premises data in BMC Helix services.

Before you begin

  • Make sure that you possess the required proficiency in the technologies and skills necessary to perform a container-based deployment of BMC Helix IT Operations Management. For details, see Recommended skill set and trainings .
  • Review the BMC Helix Automation Console release notes for known deployment or product issues. For more information, see Release notes and notices.
  • Review system requirements to make sure your current systems meet the requirements. For more information, see System requirements.

Deployment process overview

On-prem deployment architecture

Use the following topics to deploy BMC Helix Automation Console as part of the BMC Helix IT Operations Management on-premises deployment:

TaskActionReference
Preparing for deployment
1Configure the controller machine to ensure proper deployment and management. Set up the controller machine
2Set up the Harbor registry to access the BMC Helix IT Operations Management container images hosted on the BMC Docker Trusted Registry (DTR).Access the container images
3Set up a Kubernetes cluster and make sure you meet the Persistent Volume storage class requirements.Set up a Kubernetes cluster
4Configure the F5 Load Balancer to route external URLs to the NGINX Plus Ingress Controller within the Kubernetes cluster.Configure the F5 Load Balancer
5Deploy and configure the Ingress Controller to securely route external traffic to services within the Kubernetes cluster.Deploy and configure the Ingress Controller
6Perform the relevant pre-deployment tasks or any additional preinstallation steps required after installing the individual components.Perform pre-deployment tasks
Deploying BMC Helix Automation Console On-Premises
7Perform the different actions relevant to the deployment of BMC Helix Automation Console as part of BMC Helix IT Operations Management containers.Deploy BMC Helix Automation Console On-Premises
8Verify your deployment and check the status of services and resources.Verify and troubleshoot deployment issues
Performing post-deployment procedures
9Perform various post-deployment tasks to configure BMC Helix Automation Console (On-Premises)Configure BMC Helix Automation Console (On-Premises)

Task 1: To set up the controller machine

The controller machine hosts the installer and provides a set of scripts and configuration files required for installation. You download and run the installer on your system, and these resources automate and manage the installation process.
Configure the controller machine according to the specifications in the following table and make sure that Helm, Docker, and Kubernetes packages are installed.

RequirementDescription
CPU4 core
RAM16GB
Hard disk100GB
Operating system
  • RHEL (version 8.0 or higher)
  • Ubuntu (version 20.04.6 or higher)

⬆ Back to top

Task 2: To access the BMC Helix IT Operations Management container images

The BMC Helix IT Operations Management container images are hosted on the BMC Docker Trusted Registry (DTR), which is available through the Mirantis Kubernetes Engine. To access these images, set up a Harbor registry within your local network and synchronize it with BMC DTR. You can then access the container images from your local Harbor instance. For detailed steps on how to configure Harbor Registry in your environment, see Harbor Installation and Configuration.
The following table lists the host machine requirements for Harbor Registry:

RequirementDescription
CPU4 core
RAM16GB
Hard disk500GB
Network port
  • 443 with HTTPS protocol
  • 4443 with HTTPS protocol
  • 80 with HTTP protocol

For information about how to pull the container images from the Harbor repository, see the Docker Registry component details in the System requirements.

⬆ Back to top

Task 3: To set up a Kubernetes cluster

To enable deployment, you must set up a Kubernetes cluster. Kubernetes provides container orchestration, ensuring high availability, scalability, and automated workload management across multiple nodes. 

For persistent data in Kubernetes, a storage class is required to define how volumes are provisioned and managed. BMC Helix supports a Bring-Your-Own-Storage approach, allowing you to use any storage backend that meets the following requirements:

  • Dynamic Provisioning: It must automatically create volumes when requested.
  • Volume Expansion: It must allow resizing volumes without downtime.
  • ReadWriteMany Support: It must support ReadWriteMany storage.

The table below lists the minimum computing resources required for each deployment size category that must be provisioned by the Kubernetes cluster for BMC Helix Automation Console deployment. These values include Infrastructure services, Platform, and Common services.

Deployment size

Minimum worker nodes available

Hard Disk (GB) per nodeTotal vCPU limits
(Millicore) for all nodes
Total Memory limits
(GB) for all nodes

Total no. of vulnerability instances supported for all nodes

Total number of assets for all nodes

Number of concurrent users for all nodes

Block Storage (GB)ReadWriteMany storage (GB)
bhaccompact48064,0001461 Million1500587410
bhacsmall68094,0002045 Million750050237410
bhacmedium680103,00024010 Million15000100285410
bhaclarge980169,00046015 Million25000100285410
Information
Important
  • The deployment categories, like BHAC Compact and BHAC Small, are specific to BMC Helix Automation Console and are designed to handle high concurrency and large amounts of vulnerability ingestion, resulting in better performance. Therefore, it is recommended to use BMC Helix Automation Console-specific deployment categories for deployments that expect high volumes of vulnerability instances or activities involving concurrent users. 
  • BMC Helix Automation Console can also be deployed by using the standard deployment size categories like compact, small, and so on; however, these configurations are suitable only for environments with low vulnerability volumes and no concurrency requirements. For more information, see Sizing and scalability considerations.
  • For deploying BMC Helix Automation Console on-premises, NFS storage is supported for ReadWriteMany volumes. 

To compensate for the loss of worker nodes in your cluster, you must provide extra worker nodes with resources equal to your largest worker node. For example, if you have 4 nodes with 10 vCPUs and 50GB of RAM, you will need a 5th node with 10 vCPUs and 50GB of RAM to prevent recovery from being impacted by the loss of one worker node.

Additional information about the resources used for infrastructure services

The following tables display the resources required only for Infrastructure services according to each deployment size: 

Information
Important

The values in these tables are already accounted for in the Kubernetes cluster configuration requirements table, and they do not represent additional resources.

BHAC Compact
 Memory requests
(GB)
Memory limits
(GB)
vCPU requests (Millicore)vCPU limits
(Millicore)
Storage size (GB)
Postgres6175100102260090
Redis Cluster212600600060
Kafka41164009200624
RSSO2410010000
MinIO14200400040
BHAC Small
 Memory requests
(GB)
Memory limits
(GB)
vCPU requests (Millicore)vCPU limits
(Millicore)
Storage size (GB)
Postgres6887117102290090
Redis Cluster2121800600060
Kafka192315850212002124
RSSO4810040000
MinIO141200400040
BHAC Medium
 Memory requests
(GB)
Memory limits
(GB)
vCPU requests (Millicore)vCPU limits
(Millicore)
Storage size (GB)
Postgres68871201024100120
Redis Cluster5123300900060
Kafka374112850182002574
RSSO6990060000
MinIO141200400040
BHAC Large
 Memory requests
(GB)
Memory limits
(GB)
vCPU requests (Millicore)vCPU limits
(Millicore)
Storage size (GB)
Postgres68871201024100120
Redis Cluster5123300900060
Kafka374112850182002574
RSSO6990060000
MinIO141200400040

For detailed steps on how to configure Kubernetes cluster, see Sizing and scalability considerations.

⬆ Back to top

Task 4: To configure the F5 load balancer

Use an external load balancer to route external URLs to the NGINX Plus Ingress Controller within the Kubernetes cluster. BMC Helix IT Operations Management supports all standard load balancers; however, the F5 Load Balancer has been certified for BMC Helix Automation Console.

For more information, see Load balancer requirements

For information on how to configure F5 Load Balancer, see Example: Configuring an F5 load balancer.

⬆ Back to top

Task 5: To deploy and configure the Ingress Controller

Before deploying BMC Helix Automation Console, you must deploy and configure an Ingress Controller. The Ingress Controller acts as a reverse proxy and load balancer in Kubernetes. It works by implementing a Kubernetes Ingress, an API object that defines rules for routing external traffic to services within the Kubernetes cluster.

BMC Helix Automation Console supports the following Ingress Controllers, and you can configure either of them: 

⬆ Back to top

Task 6: To perform additional pre-deployment tasks

Perform the relevant pre-deployment tasks, as some components may require additional steps during the installation process.

Setting up BMC Discovery is optional for BMC Helix Automation Console standalone services. However, enabling BMC Discovery provides the following additional capabilities:

  • Dynamic Service Model: This feature automatically maps and updates relationships between applications, services, and infrastructure components, for which it requires real-time BMC Discovery data.
  • Blind Spot Detection: This feature identifies unmanaged or unknown assets, also known as blind spots, within your environment. BMC Discovery scans the network and detects these assets, ensuring they are visible and can be managed.

For more information, see Preparing for deployment.

⬆ Back to top

Task 7: To deploy BMC Helix Automation Console on-premises

Perform the following actions in the controller machine set up in Task 1 to deploy BMC Helix Automation Console as part of BMC Helix IT Operations Management containers:

To download the deployment manager

Download the deployment manager and the token to access container images from the BMC Electronic Product Distribution (EPD) site. For more information, see Downloading the deployment manager.

To prepare for password encryption

For enhanced security, the BMC Helix IT Operations Management uses encrypted passwords for deployments. After you download the product files from the BMC Electronic Product Distribution (EPD), you can prepare for password encryption. 
For more information, see Preparing for password encryption.

To prepare the deployment configuration files

Use the following configuration files to determine the applications and settings that you want to deploy in the /config folder of the deployment manager directory:

  • infra.config
  • deployment.config

Make sure to update the following values in the deployment.config file according to the product you are deploying:

IMAGE_REGISTRY_PROJECT=bmc
IMAGE_REGISTRY_ORG=lp0lz
CORE_IMAGE_REGISTRY_ORG=lp0lz
IA_IMAGE_REGISTRY_ORG=lp0oz
OPTIMIZE_IMAGE_REGISTRY_ORG=lp0pz
BHOM_IMAGE_REGISTRY_ORG=lp0mz
AIOPS_IMAGE_REGISTRY_ORG=la0cz
BHAC_IMAGE_REGISTRY_ORG=lpdbt
BHAC_COMMON_IMAGE_REGISTRY_ORG=lpcs5
SWP_INTELLIGENT_INTEGRATIONS_IMAGE_REGISTRY_ORG=lp0jz

The Deployment configuration file provides an example of the applications and settings that you can deploy in the /config folder of the deployment manager directory.

For more information, see Configuration file settings.

To deploy BMC Helix Automation Console

Run the installer scripts from the controller machine set up in Task 1. Before proceeding, make sure that BMC Helix Automation Console is enabled in the deployment.config file.

The deployment of BMC Helix IT Operations Management includes the following components:

  • BMC Helix Platform Common Services
  • Infrastructure Services
  • BMC Helix Automation Console On-Premises Application Services

Use the deployment manager script (deployment-manager.sh) to deploy these components into your Kubernetes cluster.

For more information, see Deploying BMC Helix IT Operations Management.

⬆ Back to top

Task 8: To verify and troubleshoot deployment issues

To verify your deployment, use kubectl commands to interact with your Kubernetes cluster and check the status of services and resources. If issues occur, review the logs to identify and resolve errors.
For detailed troubleshooting steps, see Troubleshooting deployment issues.

⬆ Back to top

Task 9: To configure BMC Helix Automation Console on-premises post-deployment

Perform the following actions to configure BMC Helix Automation Console post-deployment:

To register with BMC Helix and activate BMC Helix Portal

As a tenant administrator, use these steps to register, activate, and set up your BMC Helix Automation Console environment:  

  1. Log on to BMC Helix Portal by using the default login credentials. After the first login, you will be prompted to set the tenant administrator password.
  2. Click the BMC Helix Automation Console tile to launch BMC Helix Automation Console. Selecting this tile opens the Vulnerability Dashboard in BMC Helix Automation Console.
  3. To get started, configure your preferred connectors to collect and process data from third-party sources. This enables automated vulnerability management and remediation workflows.
    For more information, see Managing connectors.

To configure the Tenable.sc connector

You must configure the Tenable.sc connector to integrate BMC Helix Automation Console with Tenable.sc. The Tenable.sc connector retrieves vulnerability data from Tenable.sc scanners and feeds it into BMC Helix Automation Console for analysis and remediation planning.  

For more information, see Configuring the Tenable.sc connector.

To configure the scanner connector

You can configure different types of scanner connectors to manage vulnerabilities detected by Qualys, Tenable.io, and Rapid7 scanners. This connector enables you to integrate various types of scanners to identify security risks and vulnerabilities across your IT infrastructure.

BMC Helix Automation Console currently supports the Qualys, Tenable.io, and Rapid7 scanners under this Scanner connector.

For more information, see Configuring the Scanner connector.

To configure the TrueSight Server Automation connector

You must connect the TrueSight Server Automation endpoint with BMC Helix Automation Console to automate patching, compliance checks, and other server management tasks across your infrastructure. To configure this connector, enable the TrueSight Server Automation endpoint for Remedy Single Sign-On (RSSO). For detailed instructions, see Configuring BMC Helix Single Sign-on for BMC Helix Automation Console.

After you enable Remedy Single Sign-On (RSSO), you can connect to TrueSight Server Automation by configuring the TrueSight Server Automation connector in BMC Helix Automation Console. For detailed instructions, see Configuring the TrueSight Server Automation connector.

To configure the TrueSight Network Automation connector

You must connect the TrueSight Network Automation endpoint with BMC Helix Automation Console to automate network configuration changes, enforce policy compliance, and execute remediation workflows across network devices. To configure this connector, enable the TrueSight Network Automation endpoint for Remedy Single Sign-On (RSSO). For detailed instructions, see Configuring BMC Helix Single Sign-on for BMC Helix Automation Console.

After you enable Remedy Single Sign-On (RSSO), you can connect to TrueSight Network Automation by configuring the TrueSight Network Automation connector in BMC Helix Automation Console. For detailed instructions, see Configuring the TrueSight Network Automation connector.

To configure the BMC Discovery connector

You must configure the Discovery Cloud connector to integrate with BMC Discovery to identify all assets and related services, including business services, technical services, and business applications, within your network. By using this connector, you can identify the assets in your environment that are not included in vulnerability scans. These blind spots represent potential security risks that must be remediated.

For detailed instructions, see Configuring the BMC Discovery connector.

To configure the TrueSight Orchestration connector

You must configure the TrueSight Orchestration connector to integrate with TrueSight Orchestration for automated change management. You can create change tickets with an approval process in BMC Helix IT Service Management or ServiceNow for patching, vulnerability remediation, compliance enforcement, and template-based operations.

For detailed instructions, see Configuring the TrueSight Orchestration connector.

⬆ Back to top

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

BMC Helix Automation Console