23.2 enhancements and patches


Review the BMC Helix Log Analytics 23.2 enhancements for features that will benefit your organization and to understand changes that might impact your users.

Version

SaaS

On premises

Fixed issues

Updates and enhancements

23.2.03

✅️


23.2.01

✅️


23.2.00

✅️


For updates and enhancements in the previous releases and its patches, see Release-notes-and-notices.

BMC applies upgrades as described in BMC Helix Upgrade policy. BMC applies upgrades and patches during Maintenance windows..


The following video (1:47) provides a high-level summary of the new features and enhancements in version 23.2 of BMC Helix Log Analytics.


icon-play@2x.pnghttps://youtu.be/z32KK31HlOo



23.2.02


Option to install the Linux connector by using a non-root user

Run the Linux connector service by providing a non-root username. It will ensure that the connector accesses only those files to which the non-root user has permissions.

For more information, see Installing-and-managing-Linux-connector.


Collect logs from CentOS-based applications

Collect and analyze application logs from CentOS environments. A new connector type, Linux Connector (CentOS 7.9), is added to collect these logs. 

For more information, see Installing-and-managing-CentOS-connector.

CentOSConnector.jpg


New event status options for alert policies

The following event status options have been added to alert policies:

  • Info
  • OK
  • Unknown 
  • Warning

For more information, see Generating-alerts-from-logs.

AlertSeverityOptions.jpg




23.2.01


Filter syslog messages and Windows event logs

Add filtering rules to the collection policies that you create to collect syslog messages and Windows event logs and collect only meaningful records.

For more information, see Collecting-syslog-messages and Collecting-Windows-events.

SyslogFilteringRule.png




23.2.00


Detect anomalies

Detect rare and abnormal log patterns in the logs. You create alert policies to generate events that will notify you about the rare or abnormal log pattern. Alert policies use ML-based anomaly detection algorithm to identify anomalies.

AnomalyDetection.png

For more information, see Generating-alerts-from-logs.


Collect Windows events

Collect and analyze Windows events by creating collection policies.

Windows_Event_Collection.png

For more information, see Collecting-Windows-events.


Collect Kubernetes logs

Collect and analyze system and application logs of Kubernetes.

For more information, see Collecting-Kubernetes-logs.


Monitor logs with out-of-the-box dashboards

Operators can access the following out-of-the-box dashboards to help them track log collection statistics for Kubernetes, syslog, and Windows events.

23.2 Dashboards.gif

For more information, see Visualizing-logs


Access self-help resources with in-app help

In-app help is available from a movable widget on every screen. Click the self-help widget to access a product tour, interactive guides, instructions for setting up and going live, and more. In addition, you can continue to find answers to your questions in the online documentation or in our YouTube playlist.

KC bot with content.PNG


Enrich logs

In addition to the CSV enrichment source, the DNS, GeoIP, and LDAP enrichment sources are now available to enrich the logs.

For more information, see Enriching-logs.


Migrate log collection integrations from BMC Helix Developer Tools

As announced in version 23.1.02, all log collection capabilities migrated from BMC Helix Developer Tools to BMC Helix Log Analytics. If you are still using log collection integrations in BMC Helix Developer Tools, you must migrate to BMC Helix Log Analytics collection.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*