Configuring incident correlation to detect similar incident clusters
After BMC Helix ITSM Insights is activated, Service Desk managers can use the Real-time incident correlation workspace to detect similar incident clusters and view emerging hotspots.
The system uses a set of default fields and settings for the Real-time incident correlation workspace. As a tenant administrator, you can change the incident correlation configuration based on your requirements.
If you have set up custom priority values, you must update the Real-time incident correlation configuration settings (except Similarity threshold) to view the updated custom priority details in the Real-time incident correlation dashboard. The algorithm takes at least six hours to display the newly added custom priority values in the Real-time incident correlation workspace.
Before you begin
Out-of-the-box configuration for incident correlation
BMC Helix ITSM Insights uses a set of default fields and settings to display the clusters in the Real-time incident correlation dashboard.
The following table describes this out-of-the-box configuration for incident correlation:
Fields | Default value |
---|---|
Default fields used by the system for incident correlation |
|
The maximum number of days a cluster can stay open | 7 days |
Similarity threshold | 7 |
Minimum number of incidents that a cluster should have | 5 |
Starting with version 22.1.07, the Description (Detailed Description) field is no longer a mandatory field. If you are already using this field to generate clusters, you can exclude it from the dataset manually.
To update the configuration
- In BMC Helix ITSM Insights, click the
icon.
The Settings page is displayed. Select Real-time incident correlation > Configure.
The Real-time incident correlation configuration page is displayed.
In the Data Set section, you can view the data fields being used by the system for the configuration. The fields that you select here appear as filter criteria in the Real-time incident correlation dashboard filter.- In the Create clusters section, specify the following parameters by which the data is to be grouped:
- For the first level of grouping, select up to two fields to group the incidents at the top level for clustering. Only categorization fields are available for selection such as service, CI, and company.
- Select up to five additional field names for matching incidents to be grouped into a cluster. Only text fields are available for selection.
- In the Advanced section, specify the following details:
- The maximum period that a cluster would stay open from the time an incident is last updated. This window can range from hours to days.
The default value is 7, which means, clusters that are more than seven days old are automatically deleted. However, you can set this value up to a maximum of 30 days. Similarity threshold determines how similar the incident descriptions are in relation to the description of the original incident, which is the first incident of a cluster. The similarity threshold can be a value between 1 and 10, the default value being 7. The higher the value you select, the more stringent is the test to match the similarity of the incident, and therefore, the clusters formed are more cohesive and smaller.
- The minimum number of incidents that a cluster should have, to be shown in the dashboard.
- The maximum period that a cluster would stay open from the time an incident is last updated. This window can range from hours to days.
- Click Save.
The job configuration is updated and the system restarts building new clusters based on the new configuration. The clusters with prior configuration are removed from the dashboard.
To configure trend and major incident settings
Enter the following details to configure the trend and major incidents in clusters:
Configuration setting | Description |
---|---|
Measure trend over last hour(s) | Specify the number of hours for which the trend must be calculated. By default, the trend is calculated for the last two hours. |
Flag clusters for possible major incidents when
| The application flags clusters as possible major incident candidate clusters in the following cases:
|