Importing the monitoring and alarm policies
The following table lists the monitoring policies that you must import:
| Policy name | Description
| KMs used for the monitoring policy |
---|---|---|---|
1 | Self-Monitoring-Discovery-Appliance-Linux-Monitor policy | To monitor the BMC Discovery using the Linux Remote KM. | |
2 | Self-Monitoring-Openshift-KM policy | To monitor and manage the availability and performance of your OpenShift environment. | |
3 | Self-Monitoring-Opensearch policy | To monitor the performance metrics of the configured Elasticsearch host. | |
4 | Self-Monitoring-Kafka policy | To monitor the availability and performance of your Kafka environment. | |
5 | Self-Monitoring-Redis policy | To monitor the Redis cache infrastructure to track the availability and performance of microservices that rely on it. | |
6 | Self-Monitoring-PostgreSQL policy | To monitor the availability and performance of the PostgreSQL database resources. | |
7 | Self-Monitoring-PostgreSQL-Pool-level | To monitor individual pools of the PostgreSQL pool pod. | |
8 | Self-Monitoring-Discovery-Script-KM-Linux policy | This policy uses the Scripting KM to monitor the service-up status of BMC Discovery. | |
9 | Self-Monitoring-Ceph-Storage policy | To ensure continuous monitoring of the distributed storage infrastructure's health and performance. This robust monitoring extends to individual components, providing transparency into data status and insights into overall system health. | |
10 | Self-Monitoring-Synthetic-Container-Agent-Discovery-Local-Login | To collect information related to the health of web-based applications using attributes such as availability, performance, execution time, response time, and so on. This policy also monitors the login time for the BMC Discovery appliance local login URL. | |
12 | Self-Monitoring-Victoria-Metric | To monitor the VictoriaMetric cluster. | How to import a KM into the repository |
13 | Self-Monitoring-VMWare | To monitor vMotion for the VMs within the ESX cluster hosting the OpenShift worker nodes. |
Here is a list of alarm policies that you must import:
- BMC_Self_Monitoring_All_Policies_Configuration_Monitoring_Status
- BMC_Self_Mon_Ceph_Monitoring
- BMC_Self_Mon_DiscoveryApplianceStatusMonitoring
- BMC_Self_Mon_Discovery_Appliance_Login_Logout
- BMC_Self_Mon_Import_SRE_Synthetic_KM
- BMC_Self_Mon_K8S_KM
- BMC_Self_Mon_Kafka_KM
- BMC_Self_Mon_Linux_KM_Global_Thresholds
- BMC_Self_Mon_Linux_KM_Global_Thresholds_All
- BMC_Self_Mon_Openshift_KM
- BMC_Self_Mon_Postgres_Global_Threshold
- BMC_Self_Mon_Postgres_Linux_KM_Global_Thresholds
- BMC_Self_Mon_Postgres_Openshift_Pod
- BMC_Self_Mon_Redis_Global_Threshold
- BMC_Self_Mon_Tools_Elastic_Search
- BMC_Self_Mon_Victoria_Metrics_Global_Thresholds
- BMC_Self_Mon_VMWare_Vmotion
- BMC_Self_Mon_Zookeeper_Policy
- BMC_Self_Mon_Zookeeper_Policy_Openshift
To import monitoring and alarm policies
- Download and extract the
It contains the monitoring policies, alarm policies, scripts, and dashboards required to configure the monitoring solution. file. - Open each folder and replace the following default values with the actual values in all the files:
Default values
Replace with
BMC Helix Monitor Agent name
Example: self-mon-agent1.example.bmc.comBMC Discoveryload balancer name
Example: env9-disc-private-poc.example.bmc.comvSphere server name
Example: pe-aus-lab079.example.bmc.comreplace-clustername
Your cluster name. This is only an identifier for your cluster name.
Example: env9-adeonprem(If applicable) Your Ceph server name
Example: vl-pun-cep-vm2.bmc.comreplace-envname
An identifier for your environment name
Example: env9-devreplace-namespace-name
Your namespace name that is monitored.
Example: adeonpremreplace-tenant-id
Your tenant ID
Example: 318920956SRECNTR Agent tag name OPENSHIFTCNTR OpenShift agent tag name Example: Open the Self-Monitoring-Kafka.mo file and replace replace-agent-name.bmc.com
with your BMC Helix Monitor Agent name (self-mon-agent1.example.bmc.com). Import the monitoring policies by using the latest version of the bhompolicymigrator tool.
For more information, see Migrating TSOM Infrastructure Policies to BHOM with the bhompolicymigrator on BMC Community. You can find the bhompolicymigrator tool in the Notes & Attachments section.Ensure that the KM solution version in the monitoring & alarm policies matches the version at
BHOM > Administration tab> Repository > Installation components.Create the access key and secret key.
- On the BMC Helix portal, select the Access Keys tab.
- Click Add Key.
- Enter the key details such as key name, type and expiry (select Never expires).
- Click Confirm.
- Assign permissions to the Groups and Roles.
- In the Assignments section, click Select next to Groups and select Administrators and click Confirm.
- In the Assignments section, click Select next to Roles and select Administrator and click Confirm.
To import the monitoring policies, run the following command:
bhompolicymigrator importmonitoringpolicy [-pc --policy_criteria POLICY_INCLUDE_CRITERIA] -s --bhomserver BHOM_SERVER_HOST -p --bhomport BHOM_SERVER_PORT -t --bhomtenant BHOM_SERVER_TENANT -ak --bhomaccesskey BHOM_ACCESS_KEY -sk --bhomsecretkey BHOM_SECRET_KEYExample:
bhompolicymigrator importmonitoringpolicy --bhomserver itom-private-poc.seal.bmc.com --bhomport 443 --bhomtenant 1538205466 --bhomaccesskey PRGYEDLSY4F439FFLATXNXI6RP9QXU --bhomsecretkey w3toqgLuKHgNS03DUklDDQsoZjGppkzjLtWUbw8EG4qIIqdjE7To import the alarm policies, run the following command:
bhompolicymigrator importalarmpolicy [-pc --policy_criteria POLICY_INCLUDE_CRITERIA] -s --bhomserver BHOM_SERVER_HOST -p --bhomport BHOM_SERVER_PORT -t --bhomtenant BHOM_SERVER_TENANT -ak --bhomaccesskey BHOM_ACCESS_KEY -sk --bhomsecretkey BHOM_SECRET_KEYExample:
bhompolicymigrator importalarmpolicy --bhomserver itom-private-poc.seal.bmc.com --bhomport 443 --bhomtenant 1538205466 --bhomaccesskey PRGYEDLSY4F439FFLATXNXI6RP9QXU --bhomsecretkey w3toqgLuKHgNS03DUklDDQsoZjGppkzjLtWUbw8EG4qIIqdjE7Extract the \Self-Monitoring-V25.2.zip file, and go to \scripts\synthetic\Login-logout-discovery-local-v1.py, replace the tenant URL with your BMC Discovery load balancer URL:
https://<BMC Discovery load balancer URL>/ui/LocalLogin
Example: https://itom-disc-private-poc.seal.xyz.com/ui/LocalLogin
In the Customer_URLs.in file, set the name of your BMC Discovery load balancer URL.
Example: env9-discovery-lb.bmc.com
You need the scripts to upload in the Self-Monitoring-Synthetic-Container-Agent-Discovery-Local-Login policy.
For more information, see Configuring-the-monitoring-and-alarm-policies.
Where to go from here