Monitoring tool Integration and rules
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎08-05-2011 12:46 AM
Hi,
I have a query related to Monitoring tool Integration with SNOW:
1> There is a scenerio- If some CI or network device is down, an alarm or alert should be generated in monitoring tool then on the basis of that alarm a ticket should be opened in SNOW. And when the status of that particular alarm gets closed, the related incident ticket should get closed.
Is this possible, I have read the Document of Nimsoft Nimbus, but couldn't find this information.
2> Also tell how to make it possible that this integration filter only major alarms and produce tickets with critical priority.
Specifically, tell which Monitoring tool fulfill these two requirements?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎01-29-2018 12:46 PM
Hi Per,
It looks like with UIM you have a few options for getting incidents into the incident table, but I don't see anything regarding using Event Management specifically. I did see this... don't know if will help you.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎11-23-2020 12:28 PM
Hi
I´m trying to integrate servicenow with CA UIM, but according Broadcom Support, the ServiceNow Gateway probe is not compatible with Paris Release.
Someone integrated this products with some of the newer Servicenow versions.
If yes, could please share the probe configs
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎07-30-2018 06:01 AM
Hi Jay,
We use Nagios as our monitoring tool in conjuction with a perl script that runs on the Nagios servers to communicate with out instance through SOAP. With Nagios, each alert has it's own alert ID. We created a field in the incident table to hold this alert ID so that when Nagios creates a ticket for the alert it can find the corresponding incident to an alert for updates. You could use this same method for finding the related incident to close it depending on whether your monitoring tool has a similar type of ID.
You mentioned - each Nagios alert has its own Alert ID. I have installed a Nagios Server and ingested the generated alerts into Azure Log Analytics. But I don't see any any unique ID for alerts.
Attached screenshot of alert shown in Log Analytics. Could you please explain this?
Thanks

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎11-23-2019 04:54 AM
I may have something interesting which is a free simplistic solution which monitors the health of all your ServiceNow integrations. This feature is scheduled on a daily basis and verifies whether your integrations have delivered the data based upon an encoded query and specified threshold. In case issues are found, an email is send and a warning is created on a dashboard. The solution does not contain any table or dictionairy amendments. I added the solution to ServiceNow Share and posted an article in the Community. Feel free to have a look.
regards, Peter