As system integration specialists, we know the importance of end-to-end monitoring of your system integrations. Effectively integrating your systems help you minimize operational risks, reduce costs and increase efficiency of your Boomi integrations. And adding monitoring on top of that allows you to ensure continuous flow of data between systems, see across data silos and make timely decisions based on real-time visibility. With the application you can also monitor the performance of your Boomi with traffic data and system capacity. The newest addition to our “Monitoring with Splunk” portfolio, Boomi monitoring app for Splunk, brings the Splunk experience to Boomi users.
For a faster tool adoption and swift data onboarding, we simplified the installation, setup, and decreased the configuration time. Additionally, the application comes with documentation, best-practices and prebuilt components such as:
- Generic data-model to fuel your end-to-end monitoring dashboards
- Source types (tells you how your incoming data will look like)
- Saved searches (allows you to search for specific data)
- Reports (helps you visualise your data)
- Dashboards (gives you insightful charts)
The Boomi application pulls all the necessary information regarding the AtomSphere APIs. The modular input that we currently have configured pulls information at the specific interval defined in the inputs for:
- Execution record object
- Execution summary record object
- Environment object
- Process object
- Deployed package object
- Atom status
- Audit logs
Besides end-to-end monitoring and traffic and system capacity insights, the Boomi application for Splunk brings security capabilities to users as well. You can use the application to monitor anomalies related to potential security breaches for example set up alerts to notify you is there are changes in endpoints of an interface or if there are unknown users or files in existing integrations.
Let’s see what your Boomi environment has to tell you and start your Splunk experience. Contact us now!