This documentation supports the 23.3 and consecutive patch versions of BMC Helix Multi-Cloud Broker.To view an earlier version, select the version from the Product version menu.

Creating incidents from Cisco DNA Center issues via BMC Helix iPaaS, powered by Jitterbit


As an administrator, you can integrate BMC Helix ITSM with Cisco DNA Center (Cisco DNAC) to create BMC Helix ITSM incidents from Cisco DNAC issues. With this integration, your agents can use BMC Helix ITSM to work on the Cisco DNAC events that trigger the issues.

BMC Helix Multi-Cloud Broker, along with BMC Helix iPaaS, powered by Jitterbit, provides an out-of-the-box integration template to integrate BMC Helix ITSM with Cisco DNAC. You configure the integration in BMC Helix Multi-Cloud Broker and deploy the integration template to your BMC Helix iPaaS, powered by Jitterbit environment.

The following image gives an overview of the capabilities that this integration supports:

23.3.04_ITSM_and_Cisco_overview_2024.png

This integration provides the following capabilities:

Use case

BMC Helix ITSM  to Cisco DNAC

Cisco DNAC to BMC Helix ITSM

Create tickets

Not applicable

Creates an incident in BMC Helix ITSM from a Cisco DNAC issue and adds the Cisco DNAC issue ID in the incident

Synchronize statuses

Synchronizes the BMC Helix ITSM incident status with the Cisco DNAC issue status.


Synchronizes status updates from a Cisco DNAC issue to the corresponding  BMC Helix ITSM incident.

By default, the following Cisco DNAC issue statuses are mapped to the BMC Helix ITSM incident statuses:

  • Active—In progress
  • Ignored—Cancelled
  • Resolved—Closed

Synchronize assignee and priority changes

Updates the Cisco DNAC issue when the BMC Helix ITSM incident assignee or priority changes.

When the BMC Helix ITSM incident assignee changes, an activity note is added in the Cisco DNAC issue.

Not applicable

Cisco DNAC to BMC Helix ITSM data flow

The following image shows the flow of data for creating a BMC Helix ITSM incident from a Cisco DNAC issue:

23.3.04_Cisco to ITSM_create incident_2024.png

BMC Helix ITSM to Cisco DNAC data flow

The following image shows the flow of data updates from BMC Helix ITSM to Cisco DNAC:

23.3.04_ITSM to Cisco_Update.png

Before you begin

You require the following items to successfully set up and use this integration: 

Required versions

  • BMC Helix ITSM version 20.08 and later
  • Cisco DNAC version 1.6.1.162

Authentication and permissions

  • Access to a Cisco DNAC account
  • Permission for webhook configuration in Cisco DNAC
  • Administrator access to BMC Helix ITSM and BMC Helix Multi-Cloud Broker
  • Webhook API that supports the BASIC authentication mechanism

Subscription

Others

Task 1: To enable a bundle in Cisco DNAC

  1. Log in to Cisco DNAC.
  2. Click 23.3.01_Cisco_Menu icon.png.
  3. Select Platform > Manage > Bundles.
  4. From the bundle list, open the Network Issue Monitor and Enrichment for ITSM bundle.
  5. Enable the bundle.

Task 2: To configure an event in Cisco DNAC

  1. Log in to Cisco DNAC.
  2. Click 23.3.01_Cisco_Menu icon.png.
  3. Select Platform > Manage > Configurations.
  4. From the list of events, open an event for which you want to generate an alert.
    The event window is displayed.
  5. On the Event Details tab, review the event information.
  6. To add this event to the list of your active subscriptions, click Subscribe.
  7. To configure this event to receive different types of notifications, see the procedure in the Work with Events section in Cisco DNAC documentation.

Task 3: To configure the integration

  1. Log in to BMC Helix Innovation Studio.
  2. On Workspace, click Multi-Cloud Broker.
  3. To launch BMC Helix Multi-Cloud Broker, click Visit Deployed Application.

    Tip

    You can access BMC Helix Multi-Cloud Broker directly by entering the URL https://hostName:portNumber/helix/index.html#/com.bmc.dsm.mcsm/login and logging in as a tenant administrator.

  4. Click Settings Settings icon.png.
  5. Select Start Here > Quick Configuration Guide.
    The Quick Configuration Guide page is displayed.
  6. On the Step 1: Choose configuration tab, perform the following steps:
    1. From the Choose configuration list, select Helix iPaaS (powered by Jitterbit ).   
    2. Under Events and SecOps, select Cisco DNA Center to ITSM Incident.
      23.3.04_QCG_Cisco To ITSM Incident.png
  7. On the Step 2: Perform configurations tab, perform the following steps:
    1. Add an operating organization, if you have not already done so.
    2. Add Cisco DNA Center as the vendor organization, if you have not already done so.
    3. To add vendor metadata for Cisco DNAC, click Map vendors, and perform the following steps:
      1. On the Map Vendors page, click Map Vendor.
      2. Complete the fields as described in the following table:

        Field

        Action

        Description

        Enter a description for the Cisco DNAC vendor metadata configuration.

        Ticketing Technology Provider

        From the list, select Cisco DNA Center.

        (Optional)  Instance Name

        If you are using multiple instances of Cisco DNAC, enter the instance name that you are using to identify the instance.

        Add Mapping

        After you select the ticketing technology provider, click Add Mapping.

        BMC Helix Multi-Cloud Broker displays the default values in the Instance URL field and the Display Field Mapping section.

        Instance URL

        If you have clicked Add Mapping, this field is auto-populated. 

        Update the URL and replace the Cisco DNAC server with the correct host name.

        Vendor Field Mapping

        To map fields the BMC Helix ITSM fields with the Cisco DNAC fields, click Curly brace_Field mappings.png, and add the relevant mappings.

        Display Field Mapping

        By default, the basic Cisco DNAC fields are mapped in this section.

        To map additional fields to be displayed in the BMC Helix ITSM UI, add the relevant mappings by clicking Curly brace_Field mappings.png.

        Enable Local ITSM Communication

        By default, this toggle key is enabled.

        To use BMC Helix Multi-Cloud Broker as the underlying integration platform, disable this toggle key.

        Resolve Incident Ticket When Vendor Closes It

        By default, this toggle key is enabled so that when a Cisco DNAC case is closed, the corresponding BMC Helix ITSM incident is also closed. You can disable the toggle key if required.

        Integration Platform

        From the list, select Jitterbit.

      3. Click Save.
    4. (Not required) To fetch incidents from BMC Helix ITSM, click Define filter criteria to fetch records from ITSM to Helix Multi-Cloud Broker for incident, and perform the following steps:
      1. From the Select trigger event for incident list, select the operation for which you want to fetch the incidents.
      2. From the Advanced filter, select any of the available filters.
      3. Click Save.
        21.3_Define filter criteria image.png
        When an incident matches the operation and filter that you have selected, the system fetches that incident to BMC Helix Multi-Cloud Broker.
    5. In the Configure Cisco DNAC integration section, refer to the configuration steps listed and select the check boxes as you complete each step.
    6. Click Save.

Task 4: To download and import the integration template project file

  1. Download the Sync BMC Helix ITSM incident and CISCO DNAC incident 2024-11-01 file.

    This file contains the BMC Helix iPaaS Integration Studio project   Sync BMC Helix ITSM incident and CISCO DNAC incident 2024-11-01.

    Important

    Your ability to access product pages on the EPD website is determined by the license your company purchased.

  2. Log in to BMC Helix iPaaS and navigate to the Integration Studio.
  3. Select your organization.
  4. On the projects page, click Import.
  5. Click Browse and then select the Sync BMC Helix ITSM incident and CISCO DNAC incident 2024-11-01 .json file that you downloaded.
    The Project Name and Organization fields are automatically populated. The default project name is displayed. You can change the project name.
  6. From the Environment list, select the environment to which you want to import this integration template, and click Import.
    The project opens after the integration template is imported. 
  7. To open the project file at a later time, select the environment where the integration templates are available, select the project name, and click View/Edit.

Task 5: To update the project variables for the integration template

  1. Next to the Environment name, click the ellipsis ... and select Project Variables.
    21.05_Click Project Variables.png
  2. Update the project variables as described in the following tables:
    • BMC Helix iPaaS variables:

      Project variable

      Action

      BHIP_API_NAME

      Enter a name for the webhook API created in the BMC Helix iPaaS API Manager to receive BMC Helix Multi-Cloud Broker or Cisco DNAC requests.

      BHIP_API_User_Roles

      Enter comma-separated values of the organization roles assigned to the BMC Helix iPaaS API; for example: Admin, User, API.
      Only a user with these roles can access the APIs.

      Important:

      If you do not specify any value, all the organization roles get access to the new API.

      BHIP_MCB_API_Profile_User_Name

      The integration template creates the API in the BMC Helix iPaaS  API Manager API to handle requests from BMC Helix Multi-Cloud Broker .

      Enter a user name to create and access the BMC Helix Multi-Cloud Broker API security profile.

      BHIP_MCB_API_Profile_User_Password

      Enter a password for the BMC Helix iPaaS security profile.

      BHIP_Vendor_API_Profile_Type

      The security profile type defines the authentication type used by the Cisco DNAC webhook API to access the BMC Helix iPaaS API. The security profile type is added in the BMC Helix iPaaS API Manager. 

      Enter one of the following security profile types:

      • BASIC
      • ANONYMOUS
      • APIKEY

      The default value is APIKEY.

      Important:
      For profile types supported by the application, the integration template automatically creates the security profiles when you enable the integration. 

      BHIP_Vendor_API_Profile_User_Name

      You need not provide any value for this variable.

      BHIP_Vendor_API_Profile_User_Password

      You need not provide any value for this variable.

      BHIP_Vendor_API_Profile_ApiKey_Name

      For the APIKEY security profile typ , enter a name for the API key to create the Cisco DNAC security profile.

      The default value is apiKey.

      Important:
      Provide a value for this variable, only if you select the APIKEY option in BHIP_Vendor_API_Profile_Type.

      BHIP_Host

      Enter the BMC Helix iPaaS instance URL where you want to run this project.

      Important : Make sure that you do not enter any leading and trailing spaces in the URL.

      BHIP_User_Name

      Enter the login ID for the BMC Helix iPaaS instance.

      Important:
      The BMC Helix iPaaS login credentials are required to create the API in BMC Helix iPaaS by using RestAPI. The credentials are required because BMC Helix iPaaS does not provide a method to retrieve the login status of a user.

      BHIP_User_Password

      Enter the password for the login ID.

      Enable_BMC_Helix_To_Vendor_Integration

      Perform any of the following actions:

      • To enable the creation of Cisco DNAC issues from BMC Helix ITSM incidents and synchronization of updates and comments, enter true.
      • To disable creation of Cisco DNAC issues from BMC Helix ITSM incidents and synchronization of updates and comments, enter false.

      Enable_Vendor_To_BMC_Helix_Integration

      Perform any of the following actions:

      • To enable the creation of BMC Helix ITSM incidents from Cisco DNAC issues and synchronization of updates and comments, enter true.
      • To disable creation of BMC Helix ITSM incidents from Cisco DNAC issues and synchronization of updates and comments, enter false.
    • Cisco DNAC variables

      Project variable

      Action

      CISCODNAC_Host_URL

      Enter the Cisco DNAC instance URL in the following format:

      [http/https]://[host name]:[port]

      Important:

      Make sure that you do not enter any leading and trailing spaces in the URL.

      CISCODNAC_User_Name

      Enter the user name to access Cisco DNAC.

      CISCODNAC_User_Password

      Enter the password for the user name that you provided.


    • BMC Helix ITSM variables

      Project variable

      Action

      BMC_SmartIT_URL

      Enter the BMC Helix ITSM  URL in which you want to create incidents.

    • BMC Helix Multi-Cloud Broker variables

      Project variable

      Action

      MCB_Host

      Enter the BMC Helix Multi-Cloud Broker host URL with which Cisco DNAC issues should be synchronized in the following format:

       [http/https]://[hostname]:[port]

      Important:

      Make sure that you do not enter any leading and trailing spaces in the URL.

      MCB_User_Name

      Enter the user name to access BMC Helix Multi-Cloud Broker.

      MCB_User_Password

      Enter the password for the provided user name.

      MCB_Vendor_Name

      Enter the value in the following format for multiple instances of Cisco DNAC:

      Cisco DNAC.<Instance name>

      The instance name in the preceding format is the name you entered in the  Instance Name field while configuring vendor metadata.

      MCB_Assigned_Group

      Enter the name of the support group to which you want to assign the incident.

      MCB_Assigned_Support_Organization

      Enter the name of the support organization to which you want to assign the incident.

      MCB_Assigned_Support_Company

      Enter the name of the support company to which you want to assign the incident.

      MCB_Assigned_Company

      Enter the name of the company for which you want to create the incident.

      MCB_Assigned_Company_Id

      Enter the ID of the company for which you want to create the incident.

      MCB_Assigned_Business_Unit

      Enter the name of the business unit to which you want to assign the incident.

      The following variables are inputs from BMC Helix ITSM . Either enter values for these variables or map the appropriate Cisco DNAC fields if the data is available:

      Project variable

      Action

      ITSM_Company

      Enter the company name for which the integration template needs to be run; for example, Apex Global.

      ITSM_Customer_First_name

      Enter the first name of the BMC Helix ITSM  customer.

      ITSM_Customer_Last_Name

      Enter the last name of the BMC Helix ITSM customer.

      ITSM_Incident_Type

      Enter any of the following incident types that you want to create in BMC Helix ITSM for a corresponding Cisco DNAC issue:

      • User Service Restoration
      • User Service Request
      • Infrastructure Restoration
      • Infrastructure Event
      • Security Incident

      The default value of this variable is set to User Service Restoration.

Task 6: To deploy and enable the project

Deployment is a one-time activity that initializes the integration configurations. The UI displays a message for the deployment status.

To deploy the project and then enable the integration:

  1. To deploy the project, next to the project name, click the ellipsis ..., and select Deploy Project.
  2. To enable the integration, next to the Enable Integrations operation, under 2.0 Integrations workflow, click the ellipsis ..., and select Run.

The following image shows the steps to deploy the project and enable it by deploying the workflow:

221_JB_Deploy and enable project_Oct 2022.png

(Optional) Task 7: To set the time for API debug mode

By default, the debug mode is set to 2 hours after you run the integration. Debug logs are updated for the time set for the debug mode. To increase the debug mode for a longer period of time, perform the following steps:

  1. In BMC Helix iPaaS, powered by Jitterbit, select API Manager > My APIs.
  2. Open any of the following APIs:
    • BMC_Helix_ITSM_And_ServiceNow_Incident_Vendor_To_MCB—Creates a BMC Helix ITSM incident from a Cisco DNAC issue.
    • BMC_Helix_ITSM_And_ServiceNow_Incident_MCB_To_Vendor—Creates a Cisco DNAC issue from a BMC Helix ITSM incident.
  3. Select Enable Debug Mode Until: and set it for the required date and time.
  4. Save and publish the API.



 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*