Creating incidents from Azure Monitor alerts via BMC Helix Integration Service
Azure Monitor provides analytics and insights about your cloud and on-premises resources and applications by analyzing telemetry. Azure Monitor enables you to configure alerts on multiple Azure resources such as metrics, search queries, log events, website availability, and so on. BMC Helix Multi-Cloud Broker receives the Azure alert metadata (JSON) and creates incidents in BMC Helix ITSM based on the set of flows, connectors, and connector targets, or the integration templates and third-party application data that you configure in BMC Helix Multi-Cloud Broker.
This integration provides the following capabilities:
- Incidents are created in BMC Helix ITSM based on the following Azure Monitor alerts:
- Metric alerts
- Activity log alerts
After the incident is created in BMC Helix ITSM, you can attach the affected CI and business service to categorize the incidents. For example, an incident is created in BMC Helix ITSM, whenever a virtual machine in Azure has CPU consumption greater than 70% and server response time more than four hours.
- Alerts are updated in Azure Monitor based on updates to the BMC Helix ITSM incident.
- Information about Azure Monitor alerts or events is displayed on the BMC Helix ITSM: Smart IT interface.
Before you begin
Complete all preconfiguration tasks before you configure the Azure Monitor integration.
To select the integration option for Azure Monitor
- Log in to BMC Helix Innovation Suite.
- On Workspace, click Multi-Cloud Broker.
To launch BMC Helix Multi-Cloud Broker, click Visit Deployed Application.
- To open the configuration page, click Settings
.
- Select Start Here > Quick Configuration Guide.
- In the Step 1: Choose configuration tab, perform the following steps:
- From the Choose configuration list, select the Helix integration service.
b. For the notification feature, under Notification, select Azure Alert to ITSM Incident, and click Next.
The Perform configurations tab displays a list of the common configurations, connectors, flows, and connector targets and processes that you need to configure as described in the next tasks.
To map Azure Monitor alert data to ITSM or BMC Helix ITSM: Smart IT
Configuring vendor data includes setting up a vendor organization and defining vendor mappings for the technology provider. The Configuration Links page provides links to both options.
- If you have not done so already, on the Perform configurations tab page, click Manage Vendor Organizations to create or modify a vendor organization.
- To add or update the vendor mapping, on the Perform configurations tab, click Manage Vendor Metadata.
- To open the Map New Vendor page, on the Configure Vendor Metadata page, click
.
- Enter a Description that makes it easy for you to identify the vendor metadata configuration.
- Select the Ticketing Technology Provider.
The Ticketing Technology Provider is the application the vendor uses to manage tickets. For example, the Ticketing Technology Provider for Azure Monitor is Azure Alerts. - Add or update the Instance name for the provider.
- Click Add Mapping .
BMC Helix Multi-Cloud Broker displays the default Instance URL , and Display Field Mapping . - To add or delete values, click { } to open the JSON editor, and modify the field mappings.
- Display Field Mapping: Map vendor ticket fields to the fields on the Smart IT console.
- Display Field Mapping: Map vendor ticket fields to the fields on the Smart IT console.
Vendor Specific section for Activity Log type alerts
Vendor Specific section for Metrics type alerts
9. From the Integration Platform list, select Integration Service.
To configure connectors for integrating ITSM and Azure Monitor with BMC Helix Multi-Cloud Broker
For each feature you selected, complete the following procedure for the connectors listed on the Configuration Links page.
You must configure the connectors listed for each feature, in addition to the connectors listed under Required Common Configuration.
You might need to click the arrow on the ribbon in the lower section of the screen to open the Configuration pane.
List of connectors and configuration values for integration with Azure Monitor
To configure flow triggers and field mappings between ITSM, BMC Helix Multi-Cloud Broker, and Azure Monitor
For each feature you selected, complete this procedure for the flows listed on the Configuration Links page.
To navigate to BMC Helix Integration Service, on the Configuration Links page, click Configure flows in Integration Studio under Required Common Configurations.
You need to configure the flows listed for each feature, in addition to the flows listed under Required Common Configuration.
To open the flow template page, on the Catalog tab in Integration Studio, click the flow you want to configure.
- To create a copy of the flow template, click
.
- Select the appropriate accounts for the end-point connectors of the selected flow.
You specify the connector accounts when configuring connectors. - To update the name of the flow that you have copied from the flow template, select My Flow, open the flow that you copied, and update the title.
- Specify the trigger Conditions and Field mapping, and click OK.
For more information about trigger conditions and field mappings, see the list of flows at the end of this procedure. - Click My Flows and select the flow that you created from the flow template.
- To verify the target values for the trigger conditions and the field mappings, in the right pane, click Details.
List of flows and configuration values for integration with Azure Monitor
The out-of-the-box flow settings are based on common field mappings. You can update the trigger conditions or field mappings.
To define connector targets to enable integration with Azure Monitor
BMC preconfigures the out-of-the-box connector targets for all BMC Helix Multi-Cloud Broker features. If you want to update the connector configuration or account information, update the connector target for the feature.
- To navigate to BMC Helix Innovation Suite, in the Configuration Links page, click Configure Connector Targets in Innovation Studio under Required Common Configurations.
You need to configure the connector targets listed for each feature on the Configuration Links page, in addition to the ones listed under Required Common Configuration. - Click the connector target you want to configure or click
to configure a new connector target.
Enter or update the following values and save the configuration.
Field
Instructions
Name
Enter a unique name for the configuration.
The name is associated with the process that is related to the connector you are configuring.Connector Type
Select the connector type from the list of connectors available to you in BMC Helix Integration Service.
Configuration
Select a configuration from the list.
For example, if you select qradar as the Connector Type, all the configurations that you have made for qradar are displayed in the Configuration list.
Profile
Select a profile. For example, if you select qradar as the Connector Type, all the profiles that you have created for qradar are displayed in the Configuration list.
List of connector targets for integration with Azure Monitor
To configure Azure Alerts webhooks
- Log in to Integration Studio.
- Search for the Create Incident from Azure Alerts flow.
- Copy the WebHook URL value from the flow by clicking the Flow in Use button.
- To add a webhook to an action, follow the instructions for a basic webhook or a secure webhook.
- To configure a basic webhook, perform the following steps:
- In the Webhook panel, set Secure webhook to No.
- Paste the WebHook URL from step 3 to URI.
- Set Common Alert Schema to Yes.
- The following image shows a sample webhook action.
- To configure a secure webhook, perform the following steps:
If you have not registered the app, register the apphere.
After you have registered your app, you can find the Object ID in the Overview tab. You will also need Application ID and Tenant ID for configuration in the Azure Alerts connector.- In the Overview tab, copy Object ID of your registered app.
- In the Webhook panel, set Secure webhook to Yes.
- Paste the Object ID that you copied from the registered app.
- Paste the WebHook URL from step 3 to URI.
- Set Common Alert Schema to Yes.
The following image shows a sample webhook action
For more details about Azure Monitor, refer to the Azure Monitor documentation.
When you complete the configuration for all the components, verify that incidents are created in ITSM based on different Azure Alerts such as Metric alerts and Activity log alerts.