GrC Services lifecycle


All environments are available to the customer at all times according the avilability SLA and do not have to be requested separately for use. The customer environments are strictly separated from each other by namespace isolation techniques. For the shared components of the underlying BMC Helix platform, client and data separation is implemented at the logical level.

The customer's data is isolated and not mixed with other customer data or between environments. 

This section covers the following topics relative to:

Architecture aspects

A BMC Helix for German Regulated Cloud customer environment consists by default of a production system that is mirrored in a failover cluster and thus designed redundantly. In addition, depending on the BMC Helix product, one or two additional non-production environments are provided for use.

  • Production environment (production - redundant)
  • Quality Assurance environment (non-production)
  • Development environment (non-production)

Customers can subscribe for additional, non-production environments at any time by extending their subscription to the service.

The following table shows an overview of the environments that are delivered to the customer according to the selected subscription.

ServiceProductionQADevelopment
BMC Helix ITSM✅️✅️✅️
BMC Helix Custom Applications✅️✅️✅️
BMC Helix Digital Workplace✅️✅️✅️
BMC Helix Business Workflows✅️✅️✅️
BMC Helix Discovery✅️ ✅️
BMC Helix AIOps✅️ ✅️
Information

For customers with both BMC Helix Service Management subscription services and AIOps, Discovery and AIOps will be aligned across three environments out-of-the-box (ie. development, QA, and production)

Storage capacity

For Service Recipient data in BMC Helix Service Management subscriptions, the base capacity in the development, QA, and production environments is determined based on the total number of subscriptions.

The total number of subscriptions is calculated as Named + Concurrent (if any) User Subscriptions. The capacity allocation is as follows:

  • Up to 199 User Subscriptions = 500 GB of storage
  • For a total user subscription count of 200 or more, an additional 50 GB of storage will be al-located per 100 user subscriptions.

The calculation is based on the production database.

For BMC Helix AIOps subscriptions, your storage is accounted for within the SKUs purchased and additional storage is not applicable. 

Optional add-ons

The following table shows an overview of which additional subscriptions are possible for BMC Helix products.

ServiceAdditional EnvironmentAdditional StorageNon-Standard IntegrationSpecial encryption for database fields
BMC Helix ITSM✅️✅️✅️✅️
BMC Helix Custom Applications✅️✅️✅️✅️
BMC Helix Digital Workplace✅️✅️✅️✅️
BMC Helix Business Workflows✅️✅️✅️✅️
BMC Helix AIOps✅️ ✅️ 
BMC Helix Discovery✅️ ✅️ 

BMC Helix additional environment

Only applicable to non-production environments. 

Additional storage capacity

In case additional database storage is needed, it can be ordered in packages of 50 GB for the environments (production and non-production). Additional storage, if purchased, will be applied to each environment (standard environments plus any additional environments purchased).

BMC Helix additional non-standard integrations

The Helix for German Regulated Cloud non-standard integration option provides for the support of an additional integration to the BMC Helix solution when needed. Use this option when there is:

  • Additional email systems required (each non-standard Integration purchased entitles you to one additional email system)
  • Additional FTP directories required (each non-standard integration purchased entitles you to one additional FTP site)

An approved integration method that is considered a customization – for example, an integration that uses a published web service will not require this option. However, if an integration uses an approved Java filter (which is considered a customization), you will be required to purchase the option for each filter.

Encryption of special database fields

Service Recipients may encrypt only certain character fields. This option utilizes AES 128-bit encryption. Please note that encrypted fields are not searchable. This feature is only available for Service Management and not for AIOps.

Activation and onboarding activities

Initial provisioning and activation of a customer environment that does not contain BMC Helix AIOps & Observability is completed within 5 working days. For environments that contain BMC Helix AIOps & Observability provisioning and activation will be completed within 30 working days. Within these timeframes, URLs and access information are sent to the client.

It includes licensing, import of essential master/configuration data, and so-called basic integrations:

  • Configuration of the authentication source via HSSO (AD, LDAP, SAML, etc.)
  • Configuration of e-mail integration
  • Configuration FTP access

The integration of the BMC Helix Single Sign-On (HSSO) service is also configured with your activation. Please see the HSSO Documentation to find authentication methods.

User access

End users and users with rights to configure or administer the application access the application via a domain defined by Materna and a customer-specific prefix.

All URLs of the customer applications must be located in the helix-materna.de domain. All contained apps must be hosted under the standard product URLs defined by BMC Software.

Samples:

  • ITSM Prod environment: https://<customerprefix>.helix-materna.de
  • Smart IT Prod environment: https://<customerprefix>-smartit.helix-materna.de

Additional Information:

  • Access to the environments is controlled via the central component BMC Helix SSO (HSSO). The product can be connected to customer backend systems
  • Prerequisite on the customer side: Browser, Internet connection
  • If BMC Helix AIOps & Observability is used, user administration takes place in the BMC Helix Portal. Users can be imported automatically via LDAP sync.
  • With BMC Helix AIOps, user administration takes place in the BMC Helix Portal and users can be imported automatically via LDAP sync
  • If multiple BMC Helix applications are used in combination with BMC Helix ITSM, the user administration (RBAC) is integrated into the BMC Helix ITSM solution

Integrations

The Helix for German Regulated Cloud service provides robust support for integrations between ITSM and Service Recipient on-prem systems. A subscription includes support for the following integrations, per environment:

  • Site2Site VPN connection in between Materna DCs and Service Recipient DCs (if required)
  • 1 authentication source (if required)
  • 1 email integration (if required)
  • 1 FTP site (if required)

Additionally, your subscription includes support for published interfaces (for example, web services and BMC Remedy AR System APIs), as long as the integration does not require additional infrastructure.

Service Recipients remain solely responsible for the development, implementation, maintenance, monitoring and troubleshooting of the integration itself. This work may be performed by Materna Professional Service, BMC Software or a trusted partner under a separate contract.

Connection with Site2Site VPN

A Site2Site VPN connection can be used to integrate GrC with the customer's backend systems.

Prerequisite on the customer side: Existing VPN gateway

Connection with BMC Helix Client Gateway

Alternatively, the integration of BMC Helix GrC with customers' backend systems can be realized using the BMC Helix Client Gateway. This is technically based on the Kaazing software.

Prerequisite on the customer side: The customer must provide a VM on which the Kaazing client can be installed. The VM must be able to communicate via the Internet.

Transferring files (file import/export)

The file transfer process defines how data files are imported into and exported from your BMC Helix environments.

An example of incoming information is the initial and ongoing loading of person, asset and related data. Examples of outbound information include reports and application debug logs.

File transfer process

File trf process

For data transfer, customers receive separate accounts for each target environment (e.g. production, QA and development) on the SFTP servers provided. Within each account there are separate directories for incoming and outgoing transfers.

Storage of files

Files are retained in the directories for a maximum of 7 days.

Supported file transfer standards

The service supports encrypted connections and transfers (SFTP). User/password authentication and key authentication for SFTP are supported.

BMC Helix Discovery

For BMC Helix Discovery, the customer must deploy one or more Discovery Outposts in the desired data center(s).

Those outposts are connected to the Discovery Appliance (ideally by VPN or Kaazing), located on the BMC Helix GrC SaaS.

3 (1).jpg

BMC Helix AIOps

To enable the deployed platform to monitor the customers IT-Infrastructure, the customer needs to provide the following applications within their network, depending on the use case, and connect them via Site2Site VPN or BMC Helix Client Gateway to SaaS:

Patrol AgentsMust be deployed to the customers network to monitor servers and other endpoints
Netreo ApplianceMust be deployed to the customers network to monitor network devices
BMC Helix Intelligent IntegrationMight be necessary to deploy in customer network depending on architecture.

Agentic AI use case

All AI capabilities (LLM, ML) that are required for the usage of AIOps are part of the deployed AIOps solution and are running on the dedicated customer hardware. Please follow these instructions to setup your HelixGPT Agentic AI use cases. 

Please review BMC HelixGPT for AIOps for the list of agents and use cases available. For BMC Helix AIOps Agentic AI use cases, there are specific generative functions which require a Google Vertex AI account that needs to be provided by the customer. Please refer to the BMC Helix AIOps Google Vertex configuration instructions here: Configuring settings to use the AI-powered capabilities in BMC Helix AIOps.

Additional information for BMC Helix AIOps

Data Separation

For AIOps the data separation between different customers is guaranteed by the deployment model. For AIOps every customer environment will be deployed on dedicated hardware what will also result in a longer activation timeframe (30 working days).

Data Retention and storage limit

For AIOps data the following retention times and storage limits are defined:

Data typeDescriptionRetention periodStorage limit
EventsOpen events are closed 90 days after last modification date
Closed events remain in the system for 90 days prior to being deleted
90 days400 GB of events, raw metrics and aggregated metrics for every 1,000 assets licensed
Raw metricsAll raw metrics stored in the solution90 days
LogsAll log records that are stored in the solution3 days1 GB of daily ingestion for every 1,000 BMC Helix Operations Management - Monitoring and Event Management for Servers or BMC Helix Operations Management – Monitoring and Event Management - Resource Unit quantities purchased (i.e. 1 MB per license)
SpansAll distributed tracing span records stored in the solution7 days1 Million spans per month for every 1,000 BMC Helix Operations Management - AIOps Add-On for Servers or BMC Helix Operations Management - AIOps Add-On - Resource Unit quantities purchased (i.e. 1,000 spans per license)

 

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

BMC Helix Subscriber Information