<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ServiceNow | ITSC</title>
	<atom:link href="https://itscalecenter.com/servicenow/feed/" rel="self" type="application/rss+xml" />
	<link>https://itscalecenter.com/servicenow/</link>
	<description>ServiceNow</description>
	<lastBuildDate>Sun, 12 May 2024 08:40:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.3</generator>

<image>
	<url>https://itscalecenter.com/wp-content/uploads/2024/01/favicon-180x180-1-150x150.png</url>
	<title>ServiceNow | ITSC</title>
	<link>https://itscalecenter.com/servicenow/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Alert Management Rules Processing</title>
		<link>https://itscalecenter.com/alert-management-rule-processing/</link>
					<comments>https://itscalecenter.com/alert-management-rule-processing/#respond</comments>
		
		<dc:creator><![CDATA[Boyoti Essohouna DEGBE]]></dc:creator>
		<pubDate>Sat, 11 May 2024 23:10:13 +0000</pubDate>
				<category><![CDATA[ITOM]]></category>
		<category><![CDATA[ServiceNow]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[Alert Management Rule]]></category>
		<category><![CDATA[Event]]></category>
		<category><![CDATA[Event Rules Processing]]></category>
		<category><![CDATA[ITOM Health]]></category>
		<guid isPermaLink="false">https://itscalecenter.com/?p=249</guid>

					<description><![CDATA[<p>One of the key components of ServiceNow Event Management is the Alert Management Rules processing function. This powerful feature enables organizations to define rules and conditions that determine how alerts are handled and escalated in the system. In this article, we&#8217;ll talk about the importance of these Rules, how they work, how to configure them [&#8230;]</p>
<p>The post <a href="https://itscalecenter.com/alert-management-rule-processing/">Alert Management Rules Processing</a> appeared first on <a href="https://itscalecenter.com">ITSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>One of the key components of ServiceNow Event Management is the Alert Management Rules processing function. This powerful feature enables organizations to define rules and conditions that determine how alerts are handled and escalated in the system. In this article, we&#8217;ll talk about the importance of these Rules, how they work, how to configure them and some best practices for their implementation. Don&#8217;t hesitate to leave a comment or get in touch with us to improve this article or to ask any questions you may have concerning ServiceNow. Thank you and enjoy !</p>



<h3 class="wp-block-heading">Why is Alert Management Rule Processing important?</h3>



<p>Alert Management Rule Processing plays a vital role in enhancing the efficiency and effectiveness of incident management processes. By defining specific rules for processing alerts, organizations can automate and streamline the entire incident response lifecycle.</p>



<p>Alert Management rules are created using the Alert Management Rule form, which provides a user-friendly interface for configuring rules. This form allows users to specify the conditions that must be met for an alert to trigger the rule, as well as the actions that should be taken when the rule is triggered.</p>



<p>Overall, Alert Management is a critical component of ServiceNow&#8217;s Event Management platform, allowing users to quickly and efficiently manage alerts generated by events. By configuring and managing Alert Management rules, organizations can ensure that critical alerts are addressed promptly, minimizing the impact of events on their business operations.</p>



<h3 class="wp-block-heading">Key benefits of Alert Management Rule Processing include</h3>



<ol class="wp-block-list">
<li><strong>Automated event correlation:</strong> By defining rules based on specific fields and conditions, the system automatically correlates related alerts and groups them together. This helps eliminate alert noise and reduces the number of duplicate incidents, allowing teams to focus on resolving critical issues.</li>
</ol>



<ol class="wp-block-list" start="2">
<li><strong>Escalation and notification:</strong> The rule processing engine enables organizations to configure rules that determine the appropriate escalation and notification actions for specific types of events. For example, high-severity incidents can be automatically escalated to the appropriate teams or individuals, ensuring timely response and resolution.</li>
</ol>



<ol class="wp-block-list" start="3">
<li><strong>Intelligent routing: </strong>Alert Management Rule Processing allows for intelligent routing of alerts based on predefined attributes, such as location, business service, or impact. This ensures that alerts are assigned to the most appropriate support groups or individuals, reducing response time and enhancing customer satisfaction.</li>
</ol>



<ol class="wp-block-list" start="4">
<li><strong>Event enrichment: </strong>With the help of rules, organizations can enrich incoming alerts by adding additional contextual information or populating specific fields. This additional information can be critical when investigating and diagnosing incidents, as it provides teams with a complete picture of the event.</li>
</ol>



<ol class="wp-block-list" start="5">
<li><strong>Advanced filtering and prioritization: </strong>Alert Management Rule Processing enables organizations to filter and prioritize alerts based on specific criteria. This ensures that critical or high-priority alerts are immediately brought to the attention of the appropriate teams, reducing response time and minimizing the impact of major incidents.</li>
</ol>



<h3 class="wp-block-heading">How does Alert Management Rule Processing work?</h3>



<p>Alert Management Rule Processing in ServiceNow Event Management operates on a set of predefined rules and conditions defined within the system. These rules utilize conditions, filters, and actions to determine how incoming alerts are processed.</p>



<p>The typical workflow of Alert Management Rule Processing involves the following steps:</p>



<ol class="wp-block-list">
<li><strong>Alert ingestion:</strong> Incoming alerts from various sources are ingested into the ServiceNow Event Management system.</li>
</ol>



<ol class="wp-block-list" start="2">
<li><strong>Condition evaluation:</strong> The system evaluates each incoming alert against the predefined rule conditions. These conditions can be based on specific fields, textual matching, patterns, or time-based criteria.</li>
</ol>



<ol class="wp-block-list" start="3">
<li><strong>Rule matching:</strong> Once the conditions are evaluated, the system matches the alert against the rules defined in the system. Each rule consists of one or more conditions.</li>
</ol>



<ol class="wp-block-list" start="4">
<li><strong>Rule actions: </strong>When a rule is matched, the system executes the specified actions. These can include grouping related alerts, escalating incidents, routing alerts, sending notifications, or enriching alert information.</li>
</ol>



<ol class="wp-block-list" start="5">
<li><strong>Incident creation:</strong> If the rule specifies creating an incident, a new incident record is generated and associated with the relevant alert. This incident record is then further processed as per the organization&#8217;s incident management processes.</li>
</ol>



<ol class="wp-block-list" start="6">
<li><strong>Escalation and resolution:</strong> Based on the specified conditions and actions, alerts can be escalated to higher support groups or individuals. Escalation policies can be defined to ensure timely resolution of critical incidents.</li>
</ol>



<h3 class="wp-block-heading">Alert Management Rule Configuration</h3>



<p>ServiceNow Event Management provides a flexible platform for creating and managing alert rules. Alert rules are used to define the conditions that trigger an alert and the actions that are taken when an alert is triggered. The Alert Management module provides a user-friendly interface for creating and managing alert rules.</p>



<p></p>



<figure class="wp-block-image size-large has-custom-border"><img fetchpriority="high" decoding="async" width="1024" height="430" src="https://itscalecenter.com/wp-content/uploads/2024/05/Alert-Management-Rule-Page-1024x430.png" alt="" class="wp-image-253" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/05/Alert-Management-Rule-Page-1024x430.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/05/Alert-Management-Rule-Page-300x126.png 300w, https://itscalecenter.com/wp-content/uploads/2024/05/Alert-Management-Rule-Page-768x322.png 768w, https://itscalecenter.com/wp-content/uploads/2024/05/Alert-Management-Rule-Page-1536x645.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/05/Alert-Management-Rule-Page.png 1911w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<h4 class="wp-block-heading">Alert Info Tab</h4>



<p>The Alert Info component of Alert Management Rules in ServiceNow includes settings such as the order of rule processing and options to continue or stop searching for additional rules after processing a current rule.</p>



<p>It is important to activate the rule and specify the execution order of each rule. If the Multiple alert rules option is set to &#8220;Search for additional rules&#8221;, the execution of this rule will not stop the evaluation of the other rules.</p>



<p></p>



<figure class="wp-block-image size-large has-custom-border"><img decoding="async" width="1024" height="312" src="https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Alert-Info-1024x312.png" alt="" class="wp-image-250" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Alert-Info-1024x312.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Alert-Info-300x91.png 300w, https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Alert-Info-768x234.png 768w, https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Alert-Info-1536x468.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Alert-Info.png 1596w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<h4 class="wp-block-heading">Alert Filter Tab</h4>



<p>This component comprises the rule activation conditions and the alert filter, which is activated every time the filter criteria are met.</p>



<p>Alert rules are triggered according to the conditions defined in this tab. ServiceNow Event Management offers a wide range of conditions that can be used.</p>



<p></p>



<figure class="wp-block-image size-large has-custom-border"><img decoding="async" width="1024" height="457" src="https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Alert-Filter-1024x457.png" alt="" class="wp-image-251" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Alert-Filter-1024x457.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Alert-Filter-300x134.png 300w, https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Alert-Filter-768x343.png 768w, https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Alert-Filter-1536x686.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Alert-Filter.png 1588w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<h4 class="wp-block-heading">Actions Tab</h4>



<p>Actions within Alert Management Rules include options like remediation sub-flows, which can be automatic, manual, or both, execution limits, and launch application options. These actions are triggered when the specified conditions are met.</p>



<p></p>



<figure class="wp-block-image size-large has-custom-border"><img loading="lazy" decoding="async" width="1024" height="549" src="https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Actions-1024x549.png" alt="" class="wp-image-252" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Actions-1024x549.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Actions-300x161.png 300w, https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Actions-768x412.png 768w, https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Actions-1536x824.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/05/AMR-Actions.png 1592w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<p>Alert rules are processed in a specific order based on their precedence. The higher the precedence, the earlier the rule is processed. If multiple rules are triggered at the same time, the rule with the highest precedence is processed first. The user can specify the precedence of each rule to ensure that they are processed in the correct order.</p>



<p>In conclusion, ServiceNow Event Management provides a powerful platform for creating and managing alert rules. By using the Alert Management module, users can easily create and manage alert rules that trigger based on specific conditions and take specific actions when triggered.</p>



<h3 class="wp-block-heading">Best practices for implementing Alert Management Rule Processing</h3>



<p>To make the most of the Alert Management Rule Processing feature in ServiceNow Event Management, consider the following best practices:</p>



<ol class="wp-block-list">
<li><strong>Clearly define rules:</strong> Take the time to clearly define and document the rules based on your organization&#8217;s specific needs. Establish a clear understanding of the expected behavior and actions for different types of alerts.</li>
</ol>



<ol class="wp-block-list" start="2">
<li><strong>Regularly review and update rules:</strong> It is essential to review and update rules periodically to ensure they align with changing business requirements and evolving alert patterns. Regular maintenance helps optimize rule efficiency and relevance.</li>
</ol>



<ol class="wp-block-list" start="3">
<li><strong>Collaborate with stakeholders:</strong> Involve relevant stakeholders such as IT operations, support teams, and business owners in the rule definition process. This collaboration ensures that rules are aligned with the organization&#8217;s goals and priorities.</li>
</ol>



<ol class="wp-block-list" start="4">
<li><strong>Start with simple rules:</strong> Begin by implementing simple rules and gradually expand the complexity as needed. This iterative approach helps in understanding the impact of rules and fine-tuning them based on real-world scenarios.</li>
</ol>



<ol class="wp-block-list" start="5">
<li><strong>Leverage data analytics:</strong> Utilize data analytics capabilities to gain insights into alert patterns, trends, and performance metrics. Analyzing this data helps identify opportunities for refining rules and enhancing the overall incident management process.</li>
</ol>



<p>By honing your Alert Management Rules, you can significantly impact your IT operations in several ways:</p>



<ul class="wp-block-list">
<li><strong>Reduced Noise: </strong>Only meaningful alerts reach your dashboard, which reduces overwhelm and focuses your team’s efforts.</li>
</ul>



<ul class="wp-block-list">
<li><strong>Faster Resolution:</strong> Prioritization and automation mean that issues are resolved more quickly, often before users are even aware of a problem.</li>
</ul>



<ul class="wp-block-list">
<li><strong>Improved Monitoring:</strong> With effective rules in place, your event monitoring becomes more targeted and effective, helping you to better understand the health of your IT environment.</li>
</ul>



<p>Effective Event Management Alert Rule Management processing is essential for maintaining operational resilience and mitigating the impact of IT incidents on business operations. By understanding the core components of alert rule management and adhering to best practices, organizations can streamline incident response workflows, enhance situational awareness, and deliver superior service quality.</p>



<pre class="wp-block-preformatted">In our next article, we'll focus on best practices when implementing Event Management in your organization. Until then, we wish you a good weekend and an excellent week.<br></pre>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-wide" style="margin-top:0;margin-bottom:0"/>



<h3 class="wp-block-heading">Glossary</h3>
<p>The post <a href="https://itscalecenter.com/alert-management-rule-processing/">Alert Management Rules Processing</a> appeared first on <a href="https://itscalecenter.com">ITSC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itscalecenter.com/alert-management-rule-processing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Event Management Event Rules Processing</title>
		<link>https://itscalecenter.com/event-management-event-rules-processing/</link>
					<comments>https://itscalecenter.com/event-management-event-rules-processing/#respond</comments>
		
		<dc:creator><![CDATA[Boyoti Essohouna DEGBE]]></dc:creator>
		<pubDate>Sun, 17 Mar 2024 23:05:15 +0000</pubDate>
				<category><![CDATA[ITOM]]></category>
		<category><![CDATA[ServiceNow]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[Alert Management Rule]]></category>
		<category><![CDATA[Event]]></category>
		<category><![CDATA[Event Management]]></category>
		<category><![CDATA[Event Processing]]></category>
		<category><![CDATA[Event Rules Processing]]></category>
		<category><![CDATA[ITOM Health]]></category>
		<category><![CDATA[MID]]></category>
		<guid isPermaLink="false">https://itscalecenter.com/?p=222</guid>

					<description><![CDATA[<p>In this article, we&#8217;ll focus on processing events into Alerts. This operation, which is the second step in the ServiceNow Event Management process, is performed by what are known as Event Rules. In this article, we&#8217;ll talk about how Event Rules work, and all the other elements involved in this step. Don&#8217;t hesitate to leave [&#8230;]</p>
<p>The post <a href="https://itscalecenter.com/event-management-event-rules-processing/">Event Management Event Rules Processing</a> appeared first on <a href="https://itscalecenter.com">ITSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In this article, we&#8217;ll focus on processing events into Alerts. This operation, which is the second step in the ServiceNow Event Management process, is performed by what are known as Event Rules. In this article, we&#8217;ll talk about how Event Rules work, and all the other elements involved in this step. Don&#8217;t hesitate to leave a comment or get in touch with us to improve this article or to ask any questions you may have concerning ServiceNow. Thank you and enjoy !</p>



<h3 class="wp-block-heading">Introduction</h3>



<p></p>



<figure class="wp-block-image size-full has-custom-border"><img loading="lazy" decoding="async" width="720" height="405" src="https://itscalecenter.com/wp-content/uploads/2024/03/Event-Processing-Overview.jpg" alt="" class="wp-image-202" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/Event-Processing-Overview.jpg 720w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Processing-Overview-300x169.jpg 300w" sizes="(max-width: 720px) 100vw, 720px" /></figure>



<p></p>



<p>Event Rules are one of the main components in event processing, and there are usually predefined ones for various monitoring systems, which you can use as examples to help you configure your own. Event Rules have the following purposes:</p>



<ol class="wp-block-list">
<li>Process raw event data</li>



<li>Convert events into alerts</li>



<li>Bind CIs more efficiently than default binding</li>
</ol>



<p><strong>NB: </strong>By default, events are automatically bind to the node that generated them; after processing, the Event Rule can more effectively bind to the node to which the event should indeed be binded. Let&#8217;s take the case of an Oracle database server installed on a Linux server. When an event is generated on the server, the default binding may link the event to the Linux server, but after processing the Event Rule, and depending on the criteria we&#8217;ve defined, the event may ultimately be bind to the Oracle database server, if that&#8217;s the one presenting the dysfunction. In this way, the alert and/or incident can be assigned to the right support group (Oracle team) rather than the wrong one (Linux team) due to the default binding.</p>



<p>Events come from various monitoring systems through MID servers and Connectors or REST APIs. An event record is inserted into the event table, where Event Rules and Event Field Mappings are applied to generate alerts. Alerts Management Rules are applied to the alerts generated by the Event Rules, in order to prioritize alerts for remediation and/or root cause analysis.</p>



<h3 class="wp-block-heading">Event Processing Detail</h3>



<p></p>



<figure class="wp-block-image size-full has-custom-border"><img loading="lazy" decoding="async" width="720" height="405" src="https://itscalecenter.com/wp-content/uploads/2024/03/Event-Processing-Detail.jpg" alt="" class="wp-image-233" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/Event-Processing-Detail.jpg 720w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Processing-Detail-300x169.jpg 300w" sizes="(max-width: 720px) 100vw, 720px" /></figure>



<p></p>



<p><strong>1: </strong>As events arrive in the event table, the system identifies the Event Rules to be applied to them. Event Rules are evaluated according to the order assigned in the configuration, to check if the source and optional filters match. If the event source and optional filters match those of the Rule, then the Event Rule will be executed.</p>



<p><strong>NB: </strong>If no Rule matches, the default binding using the Node field to locate or match the CI hostname, FQDN, IP or MAC address is implemented and processing continues.</p>



<p><strong>2:</strong> If the Ignore Event Rule checkbox is selected, no alert is generated. The event is left to be examined and remedied.</p>



<p><strong>3:</strong> If Transformation and Composition Fields have been defined in the Event Rule, they will be applied.</p>



<p><strong>4:</strong> If a Threshold is set, all events are accumulated until the threshold is reached, then processed.</p>



<p><strong>NB: </strong>If the &#8220;<em><strong>Apply Additional Matching Rule</strong></em>&#8221; option is checked, the Threshold is deactivated and Event Rule processing continues.</p>



<p><strong>5:</strong> Then apply the corresponding Event Field Mapping even if there is no corresponding Event Rule.</p>



<p><strong>6: </strong>If no Severity is defined at this time, keep the event and set its status to Error, but do not generate an alert.</p>



<p><strong>7:</strong> If the Severity is defined, search the alert table for the corresponding Message Key. If a match exists, update the alert and associate the event with the unique alert. If there is no match, create a new alert for root cause analysis purposes, and associate the event with the unique alert.</p>



<h3 class="wp-block-heading">Processing Notes</h3>



<p>After processing an event, to view how the processing was applied, consult the Processing Notes field. It indicates the Event Rules and Field Mappings that have been applied to the event, the associated CI, the link to the executed Event Rule and also the rules that have not been applied.</p>



<p>As mentioned in the previous article, the life cycle of an event is defined by its state, which can be Ready, Processed, Ignored or Error.</p>



<h3 class="wp-block-heading">Event Rules</h3>



<p>Event Rules are used to :</p>



<ol class="wp-block-list">
<li>Bind alerts to specific CIs in the CMDB, showing their impact on the correct Application Service in the Service Operator Workspace and in Event Dashboards.</li>



<li>Transform and Compose alert information from relevant data in event fields.</li>



<li>Ignore events that match the filter conditions and reduce incident noise until a defined threshold is reached.</li>
</ol>



<p><strong>NB:</strong> Since the Tokyo version, it is possible to apply multiple event rules by selecting Apply Additional Matching Rules to Event Rules. To simplify the creation of Event Rules, the Event Management application provides recommended rules based on tracked events. The recommended rules engine analyzes and groups events, and provides the Regex expressions used to create event groups.</p>



<p>The configuration of an Event Rule is performed in several steps on the Event Rules Form.</p>



<h4 class="wp-block-heading">Event Rule Info</h4>



<p></p>



<figure class="wp-block-image size-large has-custom-border"><img loading="lazy" decoding="async" width="1024" height="302" src="https://itscalecenter.com/wp-content/uploads/2024/03/Event-Rule-Info-1024x302.png" alt="" class="wp-image-232" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/Event-Rule-Info-1024x302.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Rule-Info-300x88.png 300w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Rule-Info-768x226.png 768w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Rule-Info-1536x453.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Rule-Info-2048x604.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p><strong>Name:</strong> Give an appropriate name to the Event Rule.</p>



<p></p>



<p><strong>Source:</strong> Refers to the Source of the event. If this field is empty, all sources will be taken into account.</p>



<p><strong>Order:</strong> Represents the execution order of the Rules. This is very important, as Rules are processed in the sequence specified, from the lowest to the highest.</p>



<p><strong>Description:</strong> Used to add additional relevant information that can be used during processing or investigations.</p>



<h4 class="wp-block-heading">Event Filter</h4>



<p>The Filter defines the conditions that must be met for the Rule to be applied. You can also ignore events based on the Filter criteria.</p>



<p></p>



<figure class="wp-block-image size-large has-custom-border"><img loading="lazy" decoding="async" width="1024" height="553" src="https://itscalecenter.com/wp-content/uploads/2024/03/Event-Filter-1024x553.png" alt="" class="wp-image-231" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/Event-Filter-1024x553.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Filter-300x162.png 300w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Filter-768x415.png 768w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Filter-1536x830.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Filter-2048x1107.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<h4 class="wp-block-heading">Transform and Compose Alert Output</h4>



<p></p>



<figure class="wp-block-image size-large has-custom-border"><img loading="lazy" decoding="async" width="1024" height="562" src="https://itscalecenter.com/wp-content/uploads/2024/03/Transform-and-Compose-Alert-Output-1024x562.png" alt="" class="wp-image-230" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/Transform-and-Compose-Alert-Output-1024x562.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/03/Transform-and-Compose-Alert-Output-300x165.png 300w, https://itscalecenter.com/wp-content/uploads/2024/03/Transform-and-Compose-Alert-Output-768x421.png 768w, https://itscalecenter.com/wp-content/uploads/2024/03/Transform-and-Compose-Alert-Output-1536x843.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/03/Transform-and-Compose-Alert-Output-2048x1124.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<p>In this section, we define the transformation rules for obtaining the data required to generate alerts.</p>



<p>It&#8217;s important to note that all the data available to us are those received from the source. Based on that data and the Transformation Rules, we&#8217;ll deduce the useful values for alert generation. If we need more information than we&#8217;ve received, we may have to manage it directly on the source.</p>



<p>To compose the alert details, we need to drag the data from the data piles (on the left in the image) to the alert fields. Regexes can be used for complex compositions.</p>



<h3 class="wp-block-heading">Threshold</h3>



<p></p>



<figure class="wp-block-image size-large has-custom-border"><img loading="lazy" decoding="async" width="1024" height="559" src="https://itscalecenter.com/wp-content/uploads/2024/03/Threshold-1024x559.png" alt="" class="wp-image-229" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/Threshold-1024x559.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/03/Threshold-300x164.png 300w, https://itscalecenter.com/wp-content/uploads/2024/03/Threshold-768x420.png 768w, https://itscalecenter.com/wp-content/uploads/2024/03/Threshold-1536x839.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/03/Threshold-2048x1119.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<p>Thresholds allow events to be processed according to a threshold metric and volume over a given period; if the threshold is reached, an alert is generated.</p>



<p>By default, the active field is set to false; once set to true, the threshold can be defined as required.</p>



<p><strong>Create Alert Operator:</strong> allows you to define the threshold operation you wish to implement. The form varies according to the selected operation.</p>



<p><strong>Field name:</strong> defines the field to which the threshold will be applied.</p>



<p><strong>Threshold value: </strong>defines the expected value of the field to trigger threshold calculation.</p>



<p><strong>Occurs:</strong> defines the number of occurrences of the event before the alert is generated.</p>



<p><strong>Over(seconds):</strong> define the frequency with which to check whether an event corresponding to the rule has occurred.</p>



<p><strong>Close Alert Operator:</strong> allows you to define what is considered &#8220;quiet&#8221; and indicate that there is no longer a problem, then close the alert.</p>



<p><strong>NB:</strong> The threshold is disabled for rules using &#8220;Apply Additional Matching Rules&#8221;.</p>



<h3 class="wp-block-heading">Binding</h3>



<p>By default, events are bind to CIs based on the Node value, which is either a host name, IP address, MAC address or FQDN. To better bind alerts to the CIs concerned, the Event Rule uses this section to better identify the CI concerned in the CMDB. Two types of Binding are available:</p>



<p><a href="https://support.servicenow.com/kb?id=kb_article_view&amp;sysparm_article=KB1064718">CI Identification:</a> attribute criteria (CMDB attributes specific to the CI class) matched to identify a CI class on the host. This is a unique identification process for a CI class. It uses the Identification, and Reconciliation Engine (IRE), based on Identification Rules, to find the appropriate CIs.</p>



<p></p>



<figure class="wp-block-image size-large has-custom-border"><img loading="lazy" decoding="async" width="1024" height="561" src="https://itscalecenter.com/wp-content/uploads/2024/03/Binding-CI-Identification-1024x561.png" alt="" class="wp-image-228" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/Binding-CI-Identification-1024x561.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/03/Binding-CI-Identification-300x164.png 300w, https://itscalecenter.com/wp-content/uploads/2024/03/Binding-CI-Identification-768x421.png 768w, https://itscalecenter.com/wp-content/uploads/2024/03/Binding-CI-Identification-1536x841.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/03/Binding-CI-Identification-2048x1122.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<p><a href="https://support.servicenow.com/kb?id=kb_article_view&amp;sysparm_article=KB0831885">CI Field Matching: </a>use of additional information (the pair fields : values) to identify the specific CI.</p>



<p></p>



<figure class="wp-block-image size-large has-custom-border"><img loading="lazy" decoding="async" width="1024" height="559" src="https://itscalecenter.com/wp-content/uploads/2024/03/Binding-CI-Field-Matching-1024x559.png" alt="" class="wp-image-227" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/Binding-CI-Field-Matching-1024x559.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/03/Binding-CI-Field-Matching-300x164.png 300w, https://itscalecenter.com/wp-content/uploads/2024/03/Binding-CI-Field-Matching-768x420.png 768w, https://itscalecenter.com/wp-content/uploads/2024/03/Binding-CI-Field-Matching-1536x839.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/03/Binding-CI-Field-Matching-2048x1119.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<h3 class="wp-block-heading">CI Binding Process Flow</h3>



<p></p>



<figure class="wp-block-image size-full has-custom-border"><img loading="lazy" decoding="async" width="540" height="822" src="https://itscalecenter.com/wp-content/uploads/2024/03/CI-Binding-Process-Flow-edited.png" alt="" class="wp-image-239" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/CI-Binding-Process-Flow-edited.png 540w, https://itscalecenter.com/wp-content/uploads/2024/03/CI-Binding-Process-Flow-edited-197x300.png 197w" sizes="(max-width: 540px) 100vw, 540px" /></figure>



<p></p>



<ol class="wp-block-list">
<li>When an event arrives, Event Management checks the node or CI Identifiers.</li>



<li>If no Node exists, the generated alert can bind to the CI using the alert Type, Additional information, or Configuration item identifier fields.</li>



<li>If the event has a node value, search for a valid host.</li>



<li>If the event has a host and a CI type, try to bind to a device CI.</li>



<li>If the event has a host, try to bind to the application CI.</li>
</ol>



<h3 class="wp-block-heading">Event Field Mapping</h3>



<p>During Event Processing, after the Event Rules have been executed, the process continues with Event Field Mapping. This step aims to replace the information received from the event source with more meaningful and/or standardized information, before generating the alerts resulting from event processing.</p>



<p>By default, some Event Mapping Fields are provided for common monitoring systems. This allows us to start from an existing rule base that we can use to define our own rules. It is recommended to clone the default rules before modifying them.</p>



<p></p>



<figure class="wp-block-image size-large has-custom-border"><img loading="lazy" decoding="async" width="1024" height="559" src="https://itscalecenter.com/wp-content/uploads/2024/03/Event-Field-Mapping-1-1024x559.png" alt="" class="wp-image-226" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/Event-Field-Mapping-1-1024x559.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Field-Mapping-1-300x164.png 300w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Field-Mapping-1-768x419.png 768w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Field-Mapping-1-1536x838.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Field-Mapping-1-2048x1117.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<figure class="wp-block-image size-large has-custom-border"><img loading="lazy" decoding="async" width="1024" height="212" src="https://itscalecenter.com/wp-content/uploads/2024/03/Event-Field-Mapping-2-1024x212.png" alt="" class="wp-image-225" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/Event-Field-Mapping-2-1024x212.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Field-Mapping-2-300x62.png 300w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Field-Mapping-2-768x159.png 768w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Field-Mapping-2-1536x318.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Field-Mapping-2-2048x424.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<pre class="wp-block-preformatted">In our next article, we'll look at the final step in the event management process. We'll be talking about triggering proactive or remediation activities. In the meantime, I wish you an excellent day and a wonderful week!</pre>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-wide"/>



<h3 class="wp-block-heading">Glossary</h3>



<ul class="wp-block-list">
<li><strong>CI:</strong> Configuration Items</li>



<li><strong>MAC: </strong>Media Access Control</li>



<li><strong>FQDN:</strong> Fully Qualified Domain Name</li>



<li><strong>REST:</strong> REpresentational State Transfer</li>
</ul>
<p>The post <a href="https://itscalecenter.com/event-management-event-rules-processing/">Event Management Event Rules Processing</a> appeared first on <a href="https://itscalecenter.com">ITSC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itscalecenter.com/event-management-event-rules-processing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Event Management Processing</title>
		<link>https://itscalecenter.com/event-management-processing/</link>
					<comments>https://itscalecenter.com/event-management-processing/#respond</comments>
		
		<dc:creator><![CDATA[Boyoti Essohouna DEGBE]]></dc:creator>
		<pubDate>Sun, 10 Mar 2024 14:21:33 +0000</pubDate>
				<category><![CDATA[ITOM]]></category>
		<category><![CDATA[ServiceNow]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[Alert Management Rule]]></category>
		<category><![CDATA[Event]]></category>
		<category><![CDATA[Event Management]]></category>
		<category><![CDATA[ITOM Health]]></category>
		<category><![CDATA[MID]]></category>
		<category><![CDATA[MID Server]]></category>
		<guid isPermaLink="false">https://itscalecenter.com/?p=198</guid>

					<description><![CDATA[<p>In this article, we&#8217;ll talk about the ServiceNow Event Management process itself, from the reception of the Events (anomalies) from the monitoring tools to their proactive or corrective resolution. For better organization, we&#8217;ll cover the subject in three articles, this one being the first, the two others focusing on the transformation of events into alerts [&#8230;]</p>
<p>The post <a href="https://itscalecenter.com/event-management-processing/">Event Management Processing</a> appeared first on <a href="https://itscalecenter.com">ITSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In this article, we&#8217;ll talk about the ServiceNow Event Management process itself, from the reception of the Events (anomalies) from the monitoring tools to their proactive or corrective resolution. For better organization, we&#8217;ll cover the subject in three articles, this one being the first, the two others focusing on the transformation of events into alerts and then into incidents or proactive tasks.</p>



<h3 class="wp-block-heading"><strong>Main tables and configuration</strong></h3>



<p>The Event Management application is built around three main platform tables:</p>



<p><strong>Event table (em_event):</strong> the event table receives events from monitoring tools in near-real time, with relevant information about the issue.</p>



<p><strong>Alerts table (em_alert):</strong> the alerts table receives alerts generated by event processing. Alerts are action triggers that can be associated with equipment or processes.</p>



<p><strong>Service table (cmdb_ci_service):</strong> the service table is the parent table of the &#8220;Business&#8221;, &#8220;Technical&#8221; and &#8220;Applications&#8221; services, as well as other derived services. This table makes it possible to precisely identify the service concerned by alerts, and thus map its health status in detail.</p>



<p>Example of services derived from application services</p>



<ul class="wp-block-list">
<li><strong>Manual service: </strong>cmdb_ci_service_manual</li>



<li><strong>Tag-based service:</strong> cmdb_ci_service_by_tag</li>



<li><strong>Dynamic CI group:</strong> cmdb_ci_query_based_service</li>



<li><strong>Discovered application:</strong> cmdb_ci_service_discovered</li>
</ul>



<p><strong>NB:</strong> Events older than five days are removed from the event table using the table rotation function. It is recommended to not change the table rotation value, as this may have an impact on system performance.</p>



<h3 class="wp-block-heading"><strong>Event Records Overview</strong></h3>



<p></p>



<figure class="wp-block-image size-large has-custom-border"><img loading="lazy" decoding="async" width="1024" height="527" src="https://itscalecenter.com/wp-content/uploads/2024/03/Event-Record-1024x527.png" alt="" class="wp-image-200" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/Event-Record-1024x527.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Record-300x155.png 300w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Record-768x396.png 768w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Record-1536x791.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Record-2048x1055.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<p><strong>Source:</strong> refers to the monitoring tool that generated the event.</p>



<p><strong>Node:</strong> This is the configuration item on which the event occurred. It can be a CI name, MAC address, IP address or Fully Qualified Domain Name (FQDN).</p>



<p><strong>Type: </strong>indicates the type of metric, e.g. disk or memory.</p>



<p><strong>Resource: </strong>this refers to the resource within a node, such as the C drive, process name, etc.</p>



<p><strong>Metric name: </strong>this is the name or attribute of the metric in the monitoring system.</p>



<p><strong>Message key:</strong> a unique identifier for a specific event on a configuration item. The message key is responsible for event deduplication.</p>



<p><strong>Severity:</strong> this is the criticality of the event, based on the values defined in the monitoring system. Available values are Critical, Major, Minor, Warning, OK and Clear.</p>



<p><strong>Processing notes: </strong>provide feedback on processing. It shows event rules and other steps performed during processing.</p>



<p><strong>Status: </strong>This represents the life cycle of an Event. Its values are Ready, Processed, Ignored or Error.</p>



<ul class="wp-block-list">
<li><strong>Ready</strong> &#8211; when the event has not yet been processed by the system.</li>



<li><strong>Processed</strong> &#8211; when the event has been successfully processed by the system.</li>



<li><strong>Ignored</strong> &#8211; when the event has been ignored by an event rule.</li>



<li><strong>Error</strong> &#8211; when the event has encountered an error during processing.</li>
</ul>



<p><strong>NB:</strong> if the event&#8217;s &#8220;<strong>Severity</strong>&#8221; is empty, the event cannot be processed and the status will be &#8220;<strong>Error</strong>&#8220;.</p>



<h3 class="wp-block-heading"><strong>Message key</strong></h3>



<p>The message key is unique and identifies the event. It determines whether an existing alert should be updated or not.</p>



<p>If the event has no key provided at the source, the key is automatically populated with: Source, Node, Type, Host resource and Metric name (<strong><em>Source_Node_Type_Resource on host_Metric name</em></strong>).</p>



<p><strong>NB:</strong> repetitive events use the same key, the alert uses the same key as the event, and an alert can have more than one event attached.</p>



<p></p>



<figure class="wp-block-image size-full has-custom-border"><img loading="lazy" decoding="async" width="720" height="405" src="https://itscalecenter.com/wp-content/uploads/2024/03/Message-Key-Functionality.jpg" alt="" class="wp-image-201" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/Message-Key-Functionality.jpg 720w, https://itscalecenter.com/wp-content/uploads/2024/03/Message-Key-Functionality-300x169.jpg 300w" sizes="(max-width: 720px) 100vw, 720px" /></figure>



<p></p>



<h3 class="wp-block-heading"><strong>Event Processing Overview</strong></h3>



<p></p>



<figure class="wp-block-image size-full has-custom-border"><img loading="lazy" decoding="async" width="720" height="405" src="https://itscalecenter.com/wp-content/uploads/2024/03/Event-Processing-Overview.jpg" alt="" class="wp-image-202" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/Event-Processing-Overview.jpg 720w, https://itscalecenter.com/wp-content/uploads/2024/03/Event-Processing-Overview-300x169.jpg 300w" sizes="(max-width: 720px) 100vw, 720px" /></figure>



<p></p>



<p>Event processing is carried out in three steps:</p>



<h4 class="wp-block-heading"><strong>1 &#8211; Event reception (anomalies)</strong></h4>



<p>This step involves receiving events from monitoring tools. These events are collected from several sources via the MID Servers. The MID Server collects events at a frequency of 120 seconds by default. This frequency can be modified by changing the value of the event collection property (evt_mgmt.connector.minimum_schedule).</p>



<h5 class="wp-block-heading"><strong>Event sources</strong></h5>



<p>There are many different sources that can be configured to create events on ServiceNow.</p>



<ul class="wp-block-list">
<li>Configure the SNMP Trap function to send events to ServiceNow. For this method, we need to enable the SNMP Trap Listener on the MID Server.</li>
</ul>



<p></p>



<figure class="wp-block-image size-large has-custom-border"><img loading="lazy" decoding="async" width="1024" height="315" src="https://itscalecenter.com/wp-content/uploads/2024/03/MID-SNMP-Trap-Listener-1024x315.png" alt="" class="wp-image-205" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/MID-SNMP-Trap-Listener-1024x315.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/03/MID-SNMP-Trap-Listener-300x92.png 300w, https://itscalecenter.com/wp-content/uploads/2024/03/MID-SNMP-Trap-Listener-768x236.png 768w, https://itscalecenter.com/wp-content/uploads/2024/03/MID-SNMP-Trap-Listener-1536x472.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/03/MID-SNMP-Trap-Listener-2048x629.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<ul class="wp-block-list">
<li>Use the APIs to send events via custom scripts (Scripted REST APIs) or using the REST API of the ServiceNow event table, or the REST API in the import set.</li>
</ul>



<p></p>



<figure class="wp-block-image size-large has-custom-border"><img loading="lazy" decoding="async" width="1024" height="464" src="https://itscalecenter.com/wp-content/uploads/2024/03/Scripted-REST-APIs-1024x464.png" alt="" class="wp-image-203" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/Scripted-REST-APIs-1024x464.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/03/Scripted-REST-APIs-300x136.png 300w, https://itscalecenter.com/wp-content/uploads/2024/03/Scripted-REST-APIs-768x348.png 768w, https://itscalecenter.com/wp-content/uploads/2024/03/Scripted-REST-APIs-1536x696.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/03/Scripted-REST-APIs-2048x928.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<ul class="wp-block-list">
<li>Use vendor-based monitoring software to send an e-mail notification that can be treated as an event by Emails Actions or by Flows.</li>



<li>Use vendor-based ServiceNow connectors to collect events through the ServiceNow MID Server.</li>
</ul>



<p></p>



<figure class="wp-block-image size-large has-custom-border"><img loading="lazy" decoding="async" width="1024" height="560" src="https://itscalecenter.com/wp-content/uploads/2024/03/Connector-Instance-1024x560.png" alt="" class="wp-image-204" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/Connector-Instance-1024x560.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/03/Connector-Instance-300x164.png 300w, https://itscalecenter.com/wp-content/uploads/2024/03/Connector-Instance-768x420.png 768w, https://itscalecenter.com/wp-content/uploads/2024/03/Connector-Instance-1536x840.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/03/Connector-Instance-2048x1120.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<h4 class="wp-block-heading"><strong>2 &#8211; Event filtering and transformation</strong></h4>



<p>In this step, events received from monitoring tools are filtered and transformed by event rules to generate meaningful alerts. This operation reduces the noise generated by events, binds events to configuration items and generates alerts for events requiring action.</p>



<h4 class="wp-block-heading"><strong>3 &#8211; Launching proactive or resolution activities</strong></h4>



<p>At this step, we can configure the system to perform proactive or resolution tasks by creating incidents, launching remediation processes or recommending knowledge articles to problem-solving members.</p>



<p><strong>NB: </strong>By default, the tasks generated at this step is incidents, and the severity of the alert will determine the priority of these incidents. If we don&#8217;t want to generate incidents all the time, we can create a custom table extended from the tasks table to store that information.</p>



<pre class="wp-block-preformatted">For the moment, I suggest we leave it there. In future articles on Event Management, we'll cover more in-depth the filtering and transformation of events, followed by the launching of proactive or resolution activities. In the meantime, I wish you an excellent day and a wonderful week!</pre>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-wide"/>



<h3 class="wp-block-heading">Glossary</h3>
<p>The post <a href="https://itscalecenter.com/event-management-processing/">Event Management Processing</a> appeared first on <a href="https://itscalecenter.com">ITSC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itscalecenter.com/event-management-processing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Event Management Architecture</title>
		<link>https://itscalecenter.com/event-management-architecture/</link>
					<comments>https://itscalecenter.com/event-management-architecture/#respond</comments>
		
		<dc:creator><![CDATA[Boyoti Essohouna DEGBE]]></dc:creator>
		<pubDate>Sun, 03 Mar 2024 19:24:05 +0000</pubDate>
				<category><![CDATA[ITOM]]></category>
		<category><![CDATA[ServiceNow]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[AMB]]></category>
		<category><![CDATA[Application Service Map]]></category>
		<category><![CDATA[Classification]]></category>
		<category><![CDATA[CSDM]]></category>
		<category><![CDATA[Dependency View]]></category>
		<category><![CDATA[Discovery]]></category>
		<category><![CDATA[Event]]></category>
		<category><![CDATA[Exploration]]></category>
		<category><![CDATA[Identification]]></category>
		<category><![CDATA[MID]]></category>
		<category><![CDATA[Port Scan]]></category>
		<category><![CDATA[Service Mapping]]></category>
		<guid isPermaLink="false">https://itscalecenter.com/?p=178</guid>

					<description><![CDATA[<p>In this article, we will describe the ServiceNow Event Management implementation architecture, as well as the elements involved in this implementation. MID Server As we mentioned in the previous article, the ServiceNow Event Management process is based on information collected from monitoring platforms within the organization. This information is collected through various methods (Push Connectors, [&#8230;]</p>
<p>The post <a href="https://itscalecenter.com/event-management-architecture/">Event Management Architecture</a> appeared first on <a href="https://itscalecenter.com">ITSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In this article, we will describe the ServiceNow Event Management implementation architecture, as well as the elements involved in this implementation.</p>



<h3 class="wp-block-heading"><strong>MID Server</strong></h3>



<p>As we mentioned in the previous article, the ServiceNow Event Management process is based on information collected from monitoring platforms within the organization. This information is collected through various methods (Push Connectors, Pull Connectors, Emails …), some of them pass through what we call the MID Server.</p>



<p>MID for Management, Instrumentation and Discovery is a Java application that can be installed on a Windows or Linux server. This application establishes secure communication between your ServiceNow instance and the organization&#8217;s local network. Communication is outbound between the MID and your instance, and uses the SOAP method on port 443 (HTTPS).</p>



<figure class="wp-block-image size-full has-custom-border"><img loading="lazy" decoding="async" width="720" height="405" src="https://itscalecenter.com/wp-content/uploads/2024/03/MID-Server-Presentation.jpg" alt="" class="wp-image-184" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/MID-Server-Presentation.jpg 720w, https://itscalecenter.com/wp-content/uploads/2024/03/MID-Server-Presentation-300x169.jpg 300w" sizes="(max-width: 720px) 100vw, 720px" /></figure>



<p>The MID Server is also involved in several other ServiceNow platform processes, as shown in the image below.</p>



<p></p>



<figure class="wp-block-image size-full has-custom-border"><img loading="lazy" decoding="async" width="720" height="405" src="https://itscalecenter.com/wp-content/uploads/2024/03/MID-Server-Presentation-2.jpg" alt="" class="wp-image-183" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/MID-Server-Presentation-2.jpg 720w, https://itscalecenter.com/wp-content/uploads/2024/03/MID-Server-Presentation-2-300x169.jpg 300w" sizes="(max-width: 720px) 100vw, 720px" /></figure>



<p></p>



<p>To install the MID Server, we recommend that you follow the ITOM Guide:</p>



<p></p>



<figure class="wp-block-image size-full has-custom-border"><img loading="lazy" decoding="async" width="2844" height="1240" src="https://itscalecenter.com/wp-content/uploads/2024/03/MID-Server-Guided-Setup.png" alt="" class="wp-image-188" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/MID-Server-Guided-Setup.png 2844w, https://itscalecenter.com/wp-content/uploads/2024/03/MID-Server-Guided-Setup-300x131.png 300w, https://itscalecenter.com/wp-content/uploads/2024/03/MID-Server-Guided-Setup-1024x446.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/03/MID-Server-Guided-Setup-768x335.png 768w, https://itscalecenter.com/wp-content/uploads/2024/03/MID-Server-Guided-Setup-1536x670.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/03/MID-Server-Guided-Setup-2048x893.png 2048w" sizes="(max-width: 2844px) 100vw, 2844px" /></figure>



<ul class="is-style-square wp-block-list">
<li><strong>All &gt; Guided Setup &#8211; Legacy &gt; ITOM Guided Setup &gt; Get Started &gt; MID Server</strong></li>



<li><strong>Follow the three MID installation steps</strong></li>
</ul>



<ol class="wp-block-list">
<li>Create a MID server account on the instance and give it the mid_server role.</li>



<li>Download and install the appropriate MID application file on the host server.</li>



<li>Run the application and validate the MID to ensure it is reliable.</li>
</ol>



<p><strong>NB: </strong>The MID Server must be installed in the DMZ or directly behind a firewall and must be able to communicate with the servers to be discovered, as well as with the supervision tools from which events are collected.</p>



<p>Communication between the MID server and the instance takes place via the ECC Queue table. The ServiceNow instance inserts records (jobs) destined for the MID server into the ECC Queue table (outpout record), and the MID continuously polls this table to identify unprocessed records, an operation known as Polling. By default, polling is performed every 40 seconds. The frequency can be modified by the <strong>mid.poll.time</strong> parameter.</p>



<p></p>



<figure class="wp-block-image size-full has-custom-border"><img loading="lazy" decoding="async" width="720" height="405" src="https://itscalecenter.com/wp-content/uploads/2024/03/MID-Server-Presentation-3.jpg" alt="" class="wp-image-182" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/MID-Server-Presentation-3.jpg 720w, https://itscalecenter.com/wp-content/uploads/2024/03/MID-Server-Presentation-3-300x169.jpg 300w" sizes="(max-width: 720px) 100vw, 720px" /></figure>



<p></p>



<h3 class="wp-block-heading">Discovery and Service Mapping</h3>



<figure class="wp-block-image size-large has-custom-border"><img loading="lazy" decoding="async" width="1024" height="489" src="https://itscalecenter.com/wp-content/uploads/2024/03/Discovery-and-Service-Mapping-1024x489.png" alt="" class="wp-image-187" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/Discovery-and-Service-Mapping-1024x489.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/03/Discovery-and-Service-Mapping-300x143.png 300w, https://itscalecenter.com/wp-content/uploads/2024/03/Discovery-and-Service-Mapping-768x366.png 768w, https://itscalecenter.com/wp-content/uploads/2024/03/Discovery-and-Service-Mapping-1536x733.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/03/Discovery-and-Service-Mapping.png 1790w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h4 class="wp-block-heading">Discovery</h4>



<p>Discovery is the process of identifying and collecting all the applications and devices installed on your network, and then updating the CMDB based on that collected information. ServiceNow discovery is agentless and allows you to discover many different types of elements, such as Operating Systems, Applications, Running Processes, Application Supporting CIs and many more.</p>



<p>Discovery is carried out through the MID servers, which execute a series of commands (Probes) received from the ServiceNow platform to the local network, and return the result of these commands to the instance in XML format (input records in the ECC Queue table). The XML result is then processed by the Sensors, which update the CMDB according to the existence or non-existence of the collected devices. The discovery process is divided into four phases:</p>



<p></p>



<figure class="wp-block-image size-full has-custom-border"><img loading="lazy" decoding="async" width="720" height="405" src="https://itscalecenter.com/wp-content/uploads/2024/03/Discovery-Presentation-0.jpg" alt="" class="wp-image-181" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/Discovery-Presentation-0.jpg 720w, https://itscalecenter.com/wp-content/uploads/2024/03/Discovery-Presentation-0-300x169.jpg 300w" sizes="(max-width: 720px) 100vw, 720px" /></figure>



<p></p>



<h4 class="wp-block-heading">Service Mapping</h4>



<p>Also known as Top-Down discovery, it covers only the service components and ignores everything else. It enables the Operations team to become aware of the services by providing targeted discovery of the IT infrastructure directly linked to the supported services.</p>



<h3 class="wp-block-heading">Dependency View Map vs. Application Service Map</h3>



<p>Event Management includes both the Dependency View and the Application Services Map.</p>



<h4 class="wp-block-heading">Dependency View Map</h4>



<ol class="wp-block-list">
<li>Displays all dependency relationships between configuration items based on network traffic.</li>



<li>The selected CI or starting point is called Root CI with a pulsing effect.</li>



<li>Upstream and Downstream relationships are visible and, by default, up to three levels of upstream and downstream relationships are visible.</li>
</ol>



<h4 class="wp-block-heading">Application Service Map</h4>



<ol class="wp-block-list">
<li>The application Services Map provides a topological view of a specific application service.</li>



<li>The application service entry point is the highest layer, followed by the downstream relationship of consecutive configuration items.</li>



<li>Event Management highlights the service map by linking alerts to these configuration items to represent the health of the service.</li>
</ol>



<h3 class="wp-block-heading">Common Services Data Model</h3>



<p>Event Management and ITOM Health improve the ability to realize the impact of problems on the company&#8217;s services, and to prioritize accordingly. The better the service organization, the more effective the impact calculation, triage and problem resolution.</p>



<figure class="wp-block-image size-full has-custom-border"><img loading="lazy" decoding="async" width="720" height="405" src="https://itscalecenter.com/wp-content/uploads/2024/03/CSDM.jpg" alt="" class="wp-image-180" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/CSDM.jpg 720w, https://itscalecenter.com/wp-content/uploads/2024/03/CSDM-300x169.jpg 300w" sizes="(max-width: 720px) 100vw, 720px" /></figure>



<p><strong>Service:</strong> a Service is a way of delivering value to customers, facilitating the results they want to achieve, without them having to assume specific costs and risks.</p>



<p>Baseline Services :</p>



<ol class="wp-block-list">
<li><strong>Business Services:</strong> These are generally ordered by business users. The user can select the derived service offering and service commitment levels via the service catalog.</li>



<li><strong>Application Service:</strong> This is the logical representation of deployed application stacks, such as a single instance of an application.</li>



<li><strong>Technical Services:</strong> These are published for service owners, and generally underpin one or more enterprise or application services.</li>
</ol>



<h3 class="wp-block-heading">Application Service Creation</h3>



<h4 class="wp-block-heading">Automated creation:</h4>



<p>Service Mapping enables you to discover all the services in an organization and draw up a complete map of all the devices, applications and configuration profiles used in these services.</p>



<ol class="wp-block-list">
<li><strong>Agentless:</strong> no additional software is required on target devices.</li>



<li><strong>Service-centric:</strong> it discovers only CIs related to the defined service.</li>



<li><strong>Configuration-based:</strong> does not rely on network traffic (netstat).</li>
</ol>



<h4 class="wp-block-heading">Manual creation :</h4>



<p>Event Management allows you to manually create an application service using existing CIs and their relationships in the CMDB.</p>



<p><strong>Required role:</strong> app_service_admin</p>



<pre class="wp-block-preformatted">In our next article, we'll talk about the Event Management Process and how it works. In the meantime, we wish you an excellent day and a wonderful week!

</pre>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-wide" style="margin-top:0;margin-bottom:0"/>



<h3 class="wp-block-heading">Glossary</h3>



<ul class="wp-block-list">
<li>AMB : Asynchronous Messaging Bus</li>



<li>ECC : External Communication Channel</li>



<li>MID : Management, Instrumantation and Discovery</li>
</ul>
<p>The post <a href="https://itscalecenter.com/event-management-architecture/">Event Management Architecture</a> appeared first on <a href="https://itscalecenter.com">ITSC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itscalecenter.com/event-management-architecture/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Event Management Introduction</title>
		<link>https://itscalecenter.com/event-management-implementation/</link>
					<comments>https://itscalecenter.com/event-management-implementation/#respond</comments>
		
		<dc:creator><![CDATA[Boyoti Essohouna DEGBE]]></dc:creator>
		<pubDate>Sun, 25 Feb 2024 15:05:59 +0000</pubDate>
				<category><![CDATA[ITOM]]></category>
		<category><![CDATA[ServiceNow]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[Alert Management Rule]]></category>
		<category><![CDATA[Event]]></category>
		<category><![CDATA[Event Management]]></category>
		<category><![CDATA[Event Rule]]></category>
		<category><![CDATA[ITOM Health]]></category>
		<guid isPermaLink="false">https://itscalecenter.com/?p=156</guid>

					<description><![CDATA[<p>In this article, we&#8217;ll introduce the ServiceNow Event Management application, highlighting its objectives and the concepts needed to successfully implement it. General Overview Like a car&#8217;s dashboard, which helps avoid surprises (dry breakdowns, deflation, etc.) on the road, Event Management is an application that gives us visibility over the health of our IT infrastructure. Based [&#8230;]</p>
<p>The post <a href="https://itscalecenter.com/event-management-implementation/">Event Management Introduction</a> appeared first on <a href="https://itscalecenter.com">ITSC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In this article, we&#8217;ll introduce the ServiceNow Event Management application, highlighting its objectives and the concepts needed to successfully implement it.</p>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h3 class="wp-block-heading"><strong>General Overview</strong></h3>



<p>Like a car&#8217;s dashboard, which helps avoid surprises (dry breakdowns, deflation, etc.) on the road, Event Management is an application that gives us visibility over the health of our IT infrastructure. Based on the events (anomalies) collected from monitoring tools, Event Management enables us to implement preventive and/or corrective operations in the worst-case scenario, in order to limit the impact of these events on the services provided by the organization.</p>



<p>In this series of articles, we will illustrate the benefits of this application and the steps involved in implementing it within an organization.</p>



<p><strong><u>NB:</u></strong> Please feel free to comment on these articles to enrich them, or write to us with any suggestions or requirements you may have for this or any other ServiceNow product.</p>



<h3 class="wp-block-heading"><strong>Useful information</strong></h3>



<p>The Event Management application uses elements of the CMDB (Configuration Management Database) to accomplish its mission. To fully understand how this application works, we invite you to familiarize yourself with the following concepts:</p>



<p></p>
</div>
</div>



<figure class="wp-block-image size-full has-custom-border"><img loading="lazy" decoding="async" width="1704" height="890" src="https://itscalecenter.com/wp-content/uploads/2024/03/ITOM-Main-Apps.png" alt="" class="wp-image-175" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/03/ITOM-Main-Apps.png 1704w, https://itscalecenter.com/wp-content/uploads/2024/03/ITOM-Main-Apps-300x157.png 300w, https://itscalecenter.com/wp-content/uploads/2024/03/ITOM-Main-Apps-1024x535.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/03/ITOM-Main-Apps-768x401.png 768w, https://itscalecenter.com/wp-content/uploads/2024/03/ITOM-Main-Apps-1536x802.png 1536w" sizes="(max-width: 1704px) 100vw, 1704px" /></figure>



<p></p>



<p><a href="https://docs.servicenow.com/bundle/washingtondc-it-operations-management/page/product/it-operations-management/reference/r_ITOMApplications.html">IT Operation Management (ITOM):</a> This is the suite of ServiceNow products used to manage IT operations. The suite currently comprises four main applications:</p>



<ul class="wp-block-list">
<li><strong>ITOM Visibility:</strong> Discovery + Service Mapping</li>



<li><strong>ITOM Health:</strong> Event Management + Operational Intelligence</li>



<li><strong>ITOM Optimization:</strong> Cloud Management + Cloud Insights</li>
</ul>



<p></p>



<figure class="wp-block-image size-full has-custom-border"><img loading="lazy" decoding="async" width="598" height="369" src="https://itscalecenter.com/wp-content/uploads/2024/02/pic3.png.webp" alt="" class="wp-image-158" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/02/pic3.png.webp 598w, https://itscalecenter.com/wp-content/uploads/2024/02/pic3.png-300x185.webp 300w" sizes="(max-width: 598px) 100vw, 598px" /></figure>



<p></p>



<p><a href="https://docs.servicenow.com/bundle/washingtondc-it-operations-management/page/product/discovery/concept/c_GetStartedWithDiscovery.html">Discovery (Horizontal discovery):</a> Horizontal discovery is a technique used by Discovery to scan your network, find computers and devices, and then populate the CMDB with the CIs it finds. Horizontal discovery creates direct relationships between CIs, such as a &#8220;run on&#8221; relationship between an application CI and the computer CI on which it is running. Horizontal search is not aware of Business Services, and does not create relationships between CIs based on the Business Service in which they are located.</p>



<p><a href="https://docs.servicenow.com/bundle/washingtondc-it-operations-management/page/product/service-mapping/reference/c_ServiceMappingOverview.html">Service Mapping (Top-down discovery):</a> Top-down discovery is a technique used by Service Mapping to find and map critical infrastructures that are part of Business Services, such as an e-mail service. For example, top-down discovery can be used to map an enterprise web site service by showing the relationships between an Apache Tomcat web server service, a Windows server and the MSSQL database that stores the Business Service data.</p>



<p></p>



<figure class="wp-block-image size-large is-resized has-custom-border"><img loading="lazy" decoding="async" width="1024" height="468" src="https://itscalecenter.com/wp-content/uploads/2024/02/CSDM-evolution-1to4-1024x468.png" alt="" class="wp-image-159" style="border-width:2px;width:760px;height:auto" srcset="https://itscalecenter.com/wp-content/uploads/2024/02/CSDM-evolution-1to4-1024x468.png 1024w, https://itscalecenter.com/wp-content/uploads/2024/02/CSDM-evolution-1to4-300x137.png 300w, https://itscalecenter.com/wp-content/uploads/2024/02/CSDM-evolution-1to4-768x351.png 768w, https://itscalecenter.com/wp-content/uploads/2024/02/CSDM-evolution-1to4-1536x702.png 1536w, https://itscalecenter.com/wp-content/uploads/2024/02/CSDM-evolution-1to4-2048x936.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<p><strong><u>NB:</u></strong> It&#8217;s important to note that if the CMDB data is not correctly organized, the Event Management application won&#8217;t bring us any benefits. That&#8217;s why we invite you to follow the CSDM standard for properly structuring your CMDB.</p>



<h3 class="wp-block-heading"><strong>The benefits of Event Management</strong></h3>



<p></p>



<figure class="wp-block-image size-full has-custom-border"><img loading="lazy" decoding="async" width="720" height="405" src="https://itscalecenter.com/wp-content/uploads/2024/02/Event-Management-Benefits-Img.jpg" alt="" class="wp-image-161" style="border-width:2px" srcset="https://itscalecenter.com/wp-content/uploads/2024/02/Event-Management-Benefits-Img.jpg 720w, https://itscalecenter.com/wp-content/uploads/2024/02/Event-Management-Benefits-Img-300x169.jpg 300w" sizes="(max-width: 720px) 100vw, 720px" /></figure>



<p></p>



<p>Before going deeper, it is important to note that the Event Management application does not replace the monitoring tools in place within the organization, and is therefore not a monitoring tool. Its mission is to :</p>



<ol class="wp-block-list">
<li>Consolidate events from different sources</li>



<li>Filter events to reduce noise and generate qualified events</li>



<li>Link events to CIs (Configuration Items) in the CMDB (Configuration Management Database)</li>



<li>Identifies alerts created due to planned maintenance (change)</li>



<li>Performs service impact analysis</li>



<li>Provides a Service Operator Workspace and Dashboard to understand service health and view service statistics.</li>



<li>Create ServiceNow tasks for alerts</li>



<li>Help remediate alerts, automatically or manually</li>



<li>Bridge the gap between infrastructure and application</li>
</ol>



<p>As mentioned above, these benefits derive not only from the application of Event Management, but also from the implementation of a good CMDB with the CSDM standard.</p>



<pre class="wp-block-preformatted">In our next article, we'll be talking about event management architecture. In the meantime, we wish you an excellent day and a wonderful week!</pre>



<hr class="wp-block-separator has-alpha-channel-opacity is-style-wide"/>



<h3 class="wp-block-heading"><strong>Glossary</strong></h3>



<ul class="wp-block-list">
<li><strong>Service Operations Workspace</strong>: This is a dashboard that provides a view of the impact of alerts on applications and services.</li>



<li><strong>Event Dashboard</strong>: Provides a quick view of active alerts and affected services.</li>



<li><strong>Event</strong>: A notable occurrence or notification from the infrastructure.</li>



<li><strong>Metric</strong>: This is a measure of a device&#8217;s operating characteristic over time.</li>
</ul>
<p>The post <a href="https://itscalecenter.com/event-management-implementation/">Event Management Introduction</a> appeared first on <a href="https://itscalecenter.com">ITSC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itscalecenter.com/event-management-implementation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
