Configuring incident correlation to detect similar incident clusters
After BMC Helix ITSM Insights is activated, Service Desk managers can use the Real-time incident correlation workspace to detect similar incident clusters and view emerging hotspots.
The system uses a set of default fields and settings for the Real-time incident correlation workspace. As a tenant administrator, you can change the incident correlation configuration based on your requirements.
If your admin has updated your permissions in the hierarchical groups in BMC Helix ITSM, you must update the Real-time incident correlation configuration settings to view the clusters relevant to you.
If you have set up custom priority values, you must update the Real-time incident correlation configuration settings (except Similarity threshold) to view the updated custom priority details in the Real-time incident correlation dashboard. The algorithm takes at least six hours to display the newly added custom priority values in the Real-time incident correlation workspace.
Best practice for configuring changes
When you change the incident correlation configuration, all existing clusters are removed from the dashboard and the system performs the analysis again. This action might impact the analysis being carried out by any Service Desk managers or agents who are using the Real-time incident correlation dashboard for analysis.
We recommend that any configuration changes for incident correlation are done in off-hours so that the impact is minimal.
Out-of-the-box configuration for incident correlation
BMC Helix ITSM Insights uses a set of default fields and settings to display the clusters in the Real-time incident correlation dashboard.
The following table describes this out-of-the-box configuration for incident correlation:
Fields | Default value |
---|---|
Default fields used by the system for incident correlation |
|
The maximum number of days a cluster can stay open | 7 days |
Similarity threshold | 7 |
Minimum number of incidents that a cluster should have | 5 |
Starting with version 23.3.00, the Description (Detailed Description) field is no longer a mandatory field. If you are already using this field to generate clusters, you can exclude it from the dataset manually.
To update the configuration
- In BMC Helix ITSM Insights, click the
icon.
The Settings page is displayed. - Select Real-time incident correlation > Configure.
The Real-time incident correlation configuration page is displayed. In the Data set section, you can view the data fields being used by the system for the configuration. The fields that you select here appear as filter criteria in the Real-time incident correlation dashboard filter.
- In the Create clusters section, specify the parameters based on which incident data is grouped.
See Create clusters for more details. - In the Advanced cluster settings (Machine Learning) section, specify the details for generating clusters.
See Advanced ML for more details. - Upload stop word file
See Stop words for more details. - (Optional) Remove personally identifiable information from incident details during clustering.
See Personally identifiable information for more details. - In the Trending and major incident configuration section, specify the criteria for detecting major incidents in the clusters.
See Major incident configuration for more details. - In the Notification & email section, enable the notification feature, and specify the recipient and criteria to receive notifications.
See Notification for more details. - Click Save.
To configure the cluster groups
For the first level of grouping, select up to two fields to group the incidents at the top level for clustering. Only categorization fields are available for selection such as service, CI, and company.
- Select up to five additional field names for matching incidents to be grouped into a cluster. Only text fields are available for selection.
To configure advanced machine learning
- Specify the maximum period that a cluster would stay open from the time an incident is last updated.
This window can range from hours to days. The default value is 7, which means, clusters that are more than seven days old are automatically deleted. However, you can set this value up to a maximum of 30 days. Specify the similarity threshold in the slider.
Similarity threshold determines how similar the incident descriptions are in relation to the description of the original incident, which is the first incident of a cluster. The similarity threshold can be a value between 1 and 10, the default value being 7. The higher the value you select, the more stringent is the test to match the similarity of the incident, and therefore, the clusters formed are more cohesive and smaller.- Specify the minimum number of incidents that a cluster should have, to be shown in the dashboard.
To configure stop words
You can use a regular expression to define stop word patterns, such as a combination of words and sentences, which the algorithm can either remove or extract based on your preference while clustering.
In version 23.3.04 and later, you must upload stop word files in YAML (yet another markup language) format as you can no longer upload them in TXT format. However, existing stop word files in TXT format from previous release versions are still supported.
You can download the sample .YAML stop word file and include the following details in it:
- List of stop words
- Prefix and postfix notations by using wildcards
- Patterns of stop words by using regular expressions based on your use case.
The following template examples show how you can define stop word patterns using regular expressions in YAML file.
- Download the sample .YAML stop word file for reference.
Review the sample stop word file to understand the specified format and create the stop word file for uploading. Define stop words and their patterns using regular expressions in a .YAML file, and validate the file by using any YAML validator.
- Upload the .YAML file that contains your stop words for the recurrent job.
To configure Personally identifiable information
You can enable the Remove Personally Identifiable Information (PII) toggle to remove the personally identifiable information from the incident details from being clustered.
The following personally identifiable information (PII) are removed from incidents:
- Name
- Phone number
- City name
- Credit card details
- IP address
- Address
- US Passport number
- Social security number
- US driver license number
To configure trend and major incident settings
Enter the following details to configure the trend and major incidents in clusters:
Configuration setting | Description |
---|---|
Measure trend over last hour(s) | Specify the number of hours for which the trend must be calculated. By default, the trend is calculated for the last two hours. |
Flag clusters for possible major incidents when
| The application flags clusters as possible major incident candidate clusters in the following cases:
|
To configure notification and email settings
Early notification helps major incident managers to assess the impact of the incidents on the overall business even when they are not actively monitoring the dashboard. You can set up notifications for emerging, potential major incidents in Real-time incident correlation clusters. Based on business requirement, you can add other users (all incident assignees, major incident manager of the incident cluster, or any other user) as recipients of the notification.
- On the Real-time incident correlation configuration page, in the Notification & email section, turn on the Enable notification for possible major incidents toggle key.
Perform the following actions based on your requirement:
Field
Description
Notify affected incidents assignees
Select this field for notifying all unique assignees of the affected incidents present in the cluster.
For example, if a cluster contains 100 incidents, the algorithm finds the unique assignees of the 100 incidents, and sends them notification.Notify major incident managers of Affected support companies
Select this field for notifying the major incident managers of the affected support group companies.
Every incident in the cluster is associated with a company (and a contact company, if applicable) that is mapped to multiple support groups. Every support group has multiple major incident managers. The algorithm finds the major incident managers for all incidents present in the cluster based on the support groups of the incidents' company. The algorithm then sends the notification to those major incident managers.Notify major incident managers of Affected incident support groups
Select this field for notifying the potential major incident managers of the support group associated with each incident present in the cluster.
Add recipient
Enter the user name (and support group, if applicable) of the recipients who should receive the notification.
- Click Save.
Recipients can select their preferred locale and mode of receiving notification on the CTM:People form. For more details, see Configuring notifications for people records.