Integrations

Sigma is designed to allow hollistic control of your environment. Through various Compute, ITSM and AI integrations, Sigma allows you to centrally manage your Infrastructure.

Compute

Depending on your license, you can integrate Sigma with various Compute environments. Each Compute environment has unique API requirements and parameters required for a successful Simga integration.

Supported Compute environments:

AWS (Amazon Web Services)

Sigma requires an API key generated from the AWS console with sufficient AWS IAM permissions to view and manage AWS resources. Below are instructions on how to set up the AWS IAM permissions.

AWS IAM Permissions

  1. If you don’t already have a user account to be used for the Sigma integration, create a new AWS user account.

  2. For Sigma to view and manage AWS resources, add the following AWS IAM permissions:

    - EC2:
        - DescribeInstances:      Allows Sigma to describe instances in the various regions.
        - DescribeRegions:        Allows Sigma to describe AWS regions.
        - DescribeVpcs:           Allows Sigma to describe VPCs.
        - DescribeSecurityGroups: Allows Sigma to describe security groups.
        - StartInstances:         Allows Sigma to start instances.
        - StopInstances :         Allows Sigma to stop instances.
        - RebootInstances :       Allows Sigma to reboot instances.
        - TerminateInstances :    Allows Sigma to terminate instances.
    - S3:
        - ListAllMyBuckets:       Allows Sigma to list S3 buckets.
    - CloudWatch:
        - GetMetricData:          Allows Sigma to retrieve utilization metrics.
    - Systems Manager:
        - SendCommand:            Allows Sigma to execute scripts on EC2 instances.
        - GetCommandInvocation:   Allows Sigma to get command status on EC2 instances.

    Alternatively, you may copy the below JSON to configure the required IAM policies using the AWS Policy editor:

    {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Sid": "VisualEditor0",
                "Effect": "Allow",
                "Action": [
                    "ec2:RebootInstances",
                    "ssm:SendCommand",
                    "ec2:DescribeInstances",
                    "ec2:TerminateInstances",
                    "ec2:StartInstances",
                    "s3:ListAllMyBuckets",
                    "cloudwatch:GetMetricData",
                    "ec2:DescribeVpcs",
                    "ec2:DescribeRegions",
                    "ec2:StopInstances",
                    "ec2:DescribeSecurityGroups",
                    "ssm:GetCommandInvocation"
                ],
                "Resource": "*"
            }
        ]
    }
    

    Note

    Important: The above permissions apply to all resources. If you wish to limit the scope of resources, use the AWS console to manually select the resources that Sigma will be authorized to manage.

Creating AWS Access Key

  1. Sign in to the AWS Management Console and open the IAM Console.

  2. In the navigation pane, choose Users.

  3. Choose the user account whose AWS IAM permissions were set up for the Sigma connection, and then choose the Security credentials tab.

  4. In the Access keys section, choose Create access key. If you already have two access keys, this button is deactivated and you must delete an access key before you can create a new one.

  5. On the Retrieve access keys page, choose either Show to reveal the value of your user’s secret access key, or Download .csv file. This is your only opportunity to save your secret access key. After you’ve saved your secret access key in a secure location, choose Done.

  6. For the Sigma connection, you will need the AWS Access Key ID as well as the Secret Access Key.

Adding AWS Environment

  1. Login to your Sigma instance.

  2. In the navigation bar, click Administration > Environments.

  3. Select the Compute tab (Default).

  4. Select the “Click to add” button on the bottom of the Compute tab.

  5. Select AWS from the Compute product dropdown.

  6. Provide a Connection Name. This will be used to identify this specific AWS connection.

  7. Provide the Access key ID and the Secret Access Key in the specific fields and select Connect.

  8. If the connection is successful, the AWS connection will display in the environments page, as well as under the Compute > AWS tab.

OCI (Oracle Cloud Infrastructure)

Sigma requires an API key generated from the OCI console with sufficient IAM policies to view and manage OCI resources. Below are instructions on how to set up the OCI IAM policies.

OCI IAM Policies

  1. If you don’t already have a user account to be used for the Sigma integration, create a new OCI user account.

  2. Add the user to a group that has the below required IAM permissions:

    - manage instance-family in tenancy:                          Allows Sigma to manage instance-related resources across the tenancy.
    - use instance-family in tenancy:                             Allows Sigma to use instance-related resources within the tenancy.
    - manage instances in tenancy:                                Allows Sigma with management capabilities specifically on instances within the tenancy.
    - use instances in tenancy:                                   Allows Sigma to utilize instances within the tenancy.
    - manage virtual-network-family in tenancy:                   Allows Sigma management capabilities for virtual network resources within the tenancy.
    - use virtual-network-family in tenancy:                      Allows Sigma to use virtual network resources within the tenancy.
    - read app-catalog-listing in tenancy:                        Allows Sigma to read app catalog listings within the tenancy.
    - manage app-catalog-listing in tenancy:                      Allows Sigma to manage capabilities for app catalog listings within the tenancy.
    - manage app-catalog-listings in tenancy:                     Allows Sigma with management capabilities for app catalog listings within the tenancy.
    - use volume-family in tenancy:                               Allows Sigma to use volume-related resources within the tenancy.
    - use instance-agent in tenancy:                              Allows Sigma to use instance agent resources within the tenancy.
    - manage object-family in tenancy:                            Allows Sigma to manage object-related resources within the tenancy.
    - manage instance-agent-command-family in tenancy:            Allows Sigma with management capabilities for instance agent commands within the tenancy.
    - manage instance-agent-command-execution-family in tenancy:  Allows Sigma to manage instance agent command executions within the tenancy.
    - use instance-agent-command-execution-family in tenancy:     Allows Sigma to use instance agent command executions.
    - manage all-resources in tenancy:                            Allows Sigma management capabilities for all resources within the tenancy.
    - manage compute-capacity-reports in tenancy:                 Allows Sigma to manage compute capacity reports within the tenancy.
    - use dedicated-vm-hosts in tenancy:                          Allows Sigma to use dedicated VM hosts within the tenancy.
    - inspect instance-images in tenancy:                         Allows Sigma to inspect instance images within the tenancy.
    - manage objects in tenancy:                                  Allows Sigma management capabilities for objects (files) within the tenancy.
    - inspect marketplace-listings in tenancy:                    Allows Sigma to inspect marketplace listings within the tenancy.
    - {INSTANCE_IMAGE_READ} in tenancy:                           Allows Sigma to read image details.
    - read marketplace-listings in tenancy:                       Allows Sigma to read marketplace listings within the tenancy.
    - read marketplace-community-listings in tenancy:             Allows Sigma to read community marketplace listings within the tenancy.
    - use marketplace-listings in tenancy:                        Allows Sigma to use marketplace listings within the tenancy.
    - use marketplace-community-listings in tenancy:              Allows Sigma to use community marketplace listings within the tenancy.
    - inspect compartments in tenancy:                            Allows Sigma to inspect compartments (organizational units) within the tenancy.
    - manage repos in tenancy:                                    Allows Sigma management capabilities for repositories within the tenancy.
    - manage orm-stack in tenancy:                                Allows Sigma to manage ORM (Object-Relational Mapping) stacks within the tenancy.

    Alternatively, you may copy the below policy block to configure the required IAM policies using the OCI Policy Builder:

    Note

    Important: Please ensure to replace ‘Default’/’My Group’ with the name of your group that contains the Sigma user account, and ensure to replace ‘VMGroup’ with your dynamic group that contains the virtual machines that Sigma will manage.

    Allow group 'Default'/'My Group' to manage instance-family in tenancy
    Allow group 'Default'/'My Group' to use instance-family in tenancy
    Allow group 'Default'/'My Group' to manage instances in tenancy
    Allow group 'Default'/'My Group' to use instances in tenancy
    Allow group 'Default'/'My Group' to manage virtual-network-family in tenancy
    Allow group 'Default'/'My Group' to use virtual-network-family in tenancy
    Allow group 'Default'/'My Group' to read app-catalog-listing in tenancy
    Allow group 'Default'/'My Group' to manage app-catalog-listing in tenancy
    Allow group 'Default'/'My Group' to manage app-catalog-listings in tenancy
    Allow group 'Default'/'My Group' to use volume-family in tenancy
    Allow group 'Default'/'My Group' to use instance-agent in tenancy
    Allow group 'Default'/'My Group' to manage object-family in tenancy
    Allow group 'Default'/'My Group' to manage instance-agent-command-family in tenancy
    Allow group 'Default'/'My Group' to manage instance-agent-command-execution-family in tenancy
    Allow dynamic-group 'VMGroup' to use instance-agent-command-execution-family in tenancy where request.instance.id=target.instance.id
    Allow group 'Default'/'My Group' to manage all-resources in tenancy
    Allow group 'Default'/'My Group' to manage compute-capacity-reports in tenancy
    Allow group 'Default'/'My Group' to use dedicated-vm-hosts in tenancy
    Allow group 'Default'/'My Group' to inspect instance-images in tenancy
    Allow group 'Default'/'My Group' to manage objects in tenancy
    Allow group 'Default'/'My Group' to inspect marketplace-listings in tenancy
    Allow group 'Default'/'My Group' to {INSTANCE_IMAGE_READ} in tenancy
    Allow group 'Default'/'My Group' to read marketplace-listings in tenancy
    Allow group 'Default'/'My Group' to read marketplace-community-listings in tenancy
    Allow group 'Default'/'My Group' to use marketplace-listings in tenancy
    Allow group 'Default'/'My Group' to use marketplace-community-listings in tenancy
    Allow group 'Default'/'My Group' to inspect compartments in tenancy
    Allow group 'Default'/'My Group' to manage repos in tenancy
    Allow group 'Default'/'My Group' to manage orm-stack in tenancy
    Allow group 'Default'/'My Group' to manage orm-job in tenancy
    

Creating OCI API Key

  1. Sign in to the OCI Console with the username that has the required OCI IAM Policies.

  2. Click on your profile icon in the top-right corner of the console.

  3. Click My Profile at the top-right corner.

  4. Under Resources at the bottom-left, select API Keys and click Add API Key.

  5. The Add API Key dialog is displayed. Select Generate API Key Pair to create a new key pair.

  6. Click Download Private Key. A .pem file is saved to your local device. You will need this later.

  7. Click Add.

  8. Copy the API fingerprint of the generated key. You will need this later.

  9. Copy the User OCID under User infmormation. You will need this later.

  10. Click on your profile icon in the top-right corner of the console.

  11. Select “Tenancy: <your_tenancy_name>” from the dropdown menu.

  12. Copy the tenancy OCID under Tenancy infmormation. You will need this later.

Adding OCI Environment

  1. Login to your Sigma instance.

  2. In the navigation bar, click Administration > Environments.

  3. Select the Compute tab (Default).

  4. Select the “Click to add” button on the bottom of the Compute tab.

  5. Select OCI from the Compute product dropdown.

  6. Provide a Connection Name. This will be used to identify this specific OCI connection.

  7. Provide the Tenancy ID, Region (example: Ashburn), User Id and the API Fingerprint in the specific fields.

  8. Click inside the PEM File Upload zone, and upload the previously saved .pem file, then select Connect.

  9. If the connection is successful, the OCI connection will display in the environments page, as well as under the Compute > OCI tab.

Microsoft Azure

Sigma requires an API key generated from the Azure console with sufficient IAM permissions to view and manage Azure resources.

Registering Azure Application

  1. Log in to the Microsoft Entra Admin Center.

  2. Under Application, select App registrations.

  3. Click on New registration.

  4. Enter a name for the application (e.g., “Sigma Integration”).

  5. Select the Accounts in this organizational directory only option.

  6. Click Register.

  7. After registering the application, navigate to Certificates & secrets.

  8. Click on New client secret.

  9. Add a description and select an expiry period.

  10. Click Add.

  11. Copy the Value of the client secret. You will need this later.

  12. Under Overview, copy the application ID. You will need this later.

Adding Role Assignments

  1. Log in to the Microsoft Azure portal.

  2. Select the Subscriptions service.

  3. Select the subscription you wish to grant Sigma access.

  4. Click on Access control (IAM).

  5. Click Add > Add role assignment.

  6. Select the following roles:
    - Virtual Machine Contributor: Allows Sigma to manage virtual machines.
    - Monitoring Reader:           Allows Sigma to retrieve utilization metrics.
  7. Click Next then under Assign access to, select User, group, or service principal.

  8. Under Select, search for your application by name and select it.

  9. Click Review + assign.

  10. Go back to the Microsoft Azure portal homepage.

  11. Select the Tenant Properties service.

  12. Copy the Tenant ID. You will need this later.

Adding Azure Environment

  1. Login to your Sigma instance.

  2. In the navigation bar, click Administration > Environments.

  3. Select the Compute tab (Default).

  4. Select the “Click to add” button on the bottom of the Compute tab.

  5. Select Azure from the Compute product dropdown.

  6. Provide a Connection Name. This will be used to identify this specific Azure connection.

  7. Provide the Tenant ID, Application ID and the Secret Access Key in the specific fields and select Connect.

  8. If the connection is successful, the Azure connection will display in the environments page, as well as under the Compute > Azure tab.

ITSM

ServiceNow

Instructions for API connections with ServiceNow.

Jira

Instructions for API connections with Jira.

AI

ChatGPT

Instructions for API connections with ChatGPT.