Integrating with BMC Helix CMDB
Remedy ITSM Suite streamlines and automates the processes around IT service desk, asset management, and change management operations. It also enables you to link your business services to your IT infrastructure to help you manage the impact of technology changes on business and business changes on technology — in real time and into the future. In addition, you can understand and optimize the user experience, balance current and future infrastructure investments, and view potential impact on the business by using a real-time service model.
For more information, see the Remedy ITSM documentation.
The following figure depicts the technical architecture of this integration:
Configuring the Helix environment for the BMC Helix CMDB integration
Do the following:
- In the Helix portal, create a work order requesting a new integration by using the client gateway from Helix to the TrueSight Operations Management on-prem environment. Provide the following information:
- URL: For example, https://acme-smartit.onbmc.com.
Inbound connection to Helix:
Outbound connection from Helix:
- Specify the CMDB extensions to be installed in the Helix enviroment.
The BMC Helix network team does the following:
- Configures the host mapping to map the TrueSight Infrastructure Management sever host to the gateway server IP address.
- Creates and configures the gateway configuration file.
- Schedules a full restart of TrueSight Infrastructure Management for the host mapping to take effect.
- Provides a copy of the client gateway configuration file.
- Provides a copy of the Helix certificates for importing into the on-prem TrueSight Infrastructure Management environment.
- Provides a copy of the CMDB extensions to be installed on the TrueSight Infrastructure Management server.
Configuring the TrueSight Environment for the BMC Helix CMDB integration
Do the following:
- Import certificates into the TrueSight Infrastructure Management server.
- Configure the Helix Client Gateway.
- Configure the BMC Helix Change Management integration in TrueSight Infrastructure Management.
- Verify the integration.
This section explains each procedure in detail.
Step 1: Importing certificates into the TrueSight Infrastructure Management server
Do the following:
- Obtain the certificates from the Helix Network team or use the following URL to download them:
https://testssl.onbmc.com/
The following certificates are required:- Name: digicert_global_root.cer
Alias: rootCA - Name: digicert_sha_256.cer
Alias: intermediateCA Name: onbmc_wildcard.cer
Alias: onbmc_wildcardCA
- Name: digicert_global_root.cer
- On the computer where the TrueSight Infrastructure Management server is installed, back up the following files:
<
TrueSight Infrastructure Management
Installation Directory>/pw/jre/bin/lib/security/cacerts
<
TrueSight Infrastructure Management
Installation Directory>/pw/jre/bin../../pronto/conf/pnserver.ks
- Run the following commands in the order shown below:
- keytool -printcert -sslserver <helix server name:port> -rfc | keytool -importcert -keystore ../lib/security/cacerts -storepass changeit -noprompt -alias rootCA -file digicert_global_root.cer
- keytool -printcert -sslserver <helix server name:port> -rfc | keytool -importcert -keystore ../lib/security/cacerts -storepass changeit -noprompt -alias intermediateCA -file digicert_sha_256.cer
- keytool -printcert -sslserver <helix server name:port> -rfc | keytool -importcert -keystore ../lib/security/cacerts -storepass changeit -noprompt -alias onbmc_wildcard -file onbmc_wildcard.cer
- keytool -printcert -sslserver <helix server name:port> -rfc | keytool -importcert -keystore ../../pronto/conf/pnserver.ks -storepass get2net -noprompt -alias rootCA -file digicert_global_root.cer
- keytool -printcert -sslserver <helix server name:port> -rfc | keytool -importcert -keystore ../../pronto/conf/pnserver.ks -storepass get2net -noprompt -alias intermediateCA -file digicert_sha_256.cer
- keytool -printcert -sslserver <helix server name:port> -rfc | keytool -importcert -keystore ../../pronto/conf/pnserver.ks -storepass get2net -noprompt -alias onbmc_wildcard -file onbmc_wildcard.cer
- Restart the TrueSight Infrastructure Management server.
Step 2: Configuring the BMC Helix client gateway
Install the Helix client gateway. For information, see the BMC Helix documentation.
- Back up the kwic_config.xml file. <Where is the file located?>
- Copy the kwic_config.xml file to the proper location. <Need info. From where do you copy it? What is the proper location to paste?
Step 3: Configure the BMC Helix Service Resolution integration TrueSight Infrastructure Management
- If UDDI is configured for the HTTPS protocol, do the following:
- In the pw/custom/conf/pronet.conf file, set the following parameter to true:
bmc.uddi.registryserver.secure.enabled=true - Restart the TrueSight Infrastructure Management console.
- In the pw/custom/conf/pronet.conf file, set the following parameter to true:
- Edit the host's file. Add the IP address of the gateway, and point it to ONMBC-s as shown below: <Which file? where is it located?>
<gateway ipaddress> ONMBC-s - Enable BMC Server Resolution 3.5 on the TrueSight Infrastructure Management server. Do the following:
- Use the command prompt to navigate to the <InstallationDirectory>/integrations/EventIntegrator directory.
- Run the following command:
(Windows) it30.bat enablebsr35
(Linux) bash it30.sh enablebsr35 - Run the following command:
pw jproperties reload
- Log in to the TrueSight Infrastructure Management console.
- In the top right corner, click Options and then click Administration.
- In the Integrations area, click Edit.
- Select the BMC AR/CMDB Integration checkbox.
- Add information in the following fields for the Helix AR Server:
- AR Server Hostname: ONBMC-s
- AR Server Port: dev-4600, qa-4700, prod-4800
- AR Server User: Obtain the user name from the BMC Helix team.
- AR Server password: Obtain the user name from the BMC Helix team.
- Select the Publishing mode.
- If you want to enable the cross-launch capability, enter information in the following fields:
- UDDI Hostname: <customer name>-<dev or qa or prod>.onbmc.com
- UDDI Port: 443
- UDDI User: Obtain the user name from the BMC Helix team.
- UDDI Password: Obtain the password from the BMC Helix team.
- Infrastructure Management Server Port: 8080, 443
- Select a protocol for the TrueSight Infrastructure Management server.
If you integrate with Atrium CMDB in an AR Server Group, manually configure the pserver.conf file (location?). Edit the ARSGroupMembers in the pserver.conf file and set to all AR Servers of the group that have the reconciliation function enabled.
For more information, see Configuring the Publishing Server to integrate with an AR Server group.
- Install the CMDB extension jar files that you received from the BMC Helix team. Do the following:
- Restart the TrueSight Infrastructure Management server.
Step 4: Verifying the integration
- Log in to the BMC Helix MidTier Server as the user given to you by the BMC Helix team.
- Go to Atrium Core > Atrium Core console.
- Execute the Impact module designer.
- Create a test model in the Impact module designer.
- Verify that the test model is published in the TrueSight Infrastructure Management.
Configuring the integration
Do the following:
- Open the TrueSight console.
- Click Administration > Integrations.
- Under Remedy ITSM, BMC Helix ITSM and BMC CMDB Integrations, click the Configure TrueSight Presentation Server with ITSM Change Management menu and then click Edit.
- On the Change Management Integration page, do the following:
- Add the following information:
- CMDB user name and password
- UDDI host name
- CMDB UDDI port number, user name, and password
- Select the HTTP or HTTPS protocol for the mid-tier server.'
- Select Activate Integration. If you do not want to active the integration at this time, you can do it later.
- Add the following information:
- Click Save.
You can see the integration added on the Change Management Integration page.