Data Template: Incident Management

Universal process mining template
Data Template: Incident Management

Your Incident Management Data Template

Universal process mining template

This is our generic process mining data template for Incident Management. Use our system-specific templates for more specific guidance.

Select a specific system
  • Universal data structure for any incident management system
  • Recommended attributes and activities for comprehensive analysis
  • Guidance on extracting data, including system-specific examples

Incident Management Attributes

This section details the recommended data fields and case properties crucial for creating a comprehensive event log and enabling in-depth analysis of your incident management process.
5 Required 8 Recommended 4 Optional
NameDescription
Activity Name
ActivityName
The name of a specific business activity, event, or status change that occurred during the incident's lifecycle.
Description

The Activity Name describes a distinct step or task performed as part of the incident management process. These activities represent the building blocks of the process map and can include automated system events, such as 'SLA Breach Detected', or manual user actions, like 'Agent Assigned' or 'Workaround Provided'.

For process mining analysis, this attribute is fundamental. It defines the nodes in the process graph, allowing analysts to visualize the flow of work, identify common pathways, discover bottlenecks, and analyze deviations from the standard procedure. The granularity and clarity of activity names directly impact the quality and depth of the insights that can be derived.

Why it matters

This attribute defines the steps in the process, enabling the visualization and analysis of the incident lifecycle flow.

Where to get

Often derived from a combination of event logs, audit trails, status change records, or task description fields within the incident management system.

Examples
Incident CreatedGroup AssignedIncident ResolvedStatus Changed To Pending
Event Timestamp
EventTimestamp
The precise date and time when a specific activity or event occurred for an incident.
Description

The Event Timestamp marks the exact moment an activity took place. Each activity within an incident's lifecycle should have a corresponding timestamp to establish a chronological sequence of events.

This attribute is critical for any time-based process mining analysis. It enables the calculation of cycle times between activities, the duration of specific steps, and the overall incident resolution time. By analyzing timestamps, organizations can identify bottlenecks, measure adherence to SLAs, and understand how process performance changes over time. It is the foundation for calculating key performance indicators like Average Resolution Time.

Why it matters

It provides the chronological order of events, which is essential for calculating durations, identifying bottlenecks, and analyzing process performance over time.

Where to get

Found in event logs, audit history tables, or as a 'last modified' or 'creation date' on specific related records.

Examples
2023-10-26T10:00:00Z2024-01-15T14:35:10Z2023-11-01T09:12:45Z
Incident ID
IncidentId
The unique identifier assigned to each incident. This ID serves as the primary key for tracking an incident throughout its entire lifecycle.
Description

The Incident ID is a unique alphanumeric code that distinguishes one incident from all others within the system. It is generated upon the creation of a new incident and remains constant until the incident is permanently archived or deleted.

In process mining, the Incident ID is the cornerstone of the analysis, serving as the Case ID. It allows the software to stitch together all related events, status changes, and activities into a single, cohesive process instance. By grouping all events under a common Incident ID, analysts can accurately map the end-to-end journey of each incident, from its initial report to its final resolution and closure.

Why it matters

It is essential for linking all related activities and events together to reconstruct the end-to-end incident lifecycle for process mining.

Where to get

This is the primary key for an incident and is typically found in the header or main record of every incident table or object.

Examples
INC0010032TICKET-84321789456123
Last Data Update
LastDataUpdate
The timestamp indicating the last time the data for this record was refreshed from the source system.
Description

The Last Data Update timestamp specifies when the data was most recently extracted or synchronized from the source system. This is a metadata field that reflects the freshness of the data being analyzed.

In process mining analysis, this attribute is important for understanding the timeliness of the insights generated. It helps users know if they are looking at real-time information or a snapshot from a previous point in time. This context is vital for operational monitoring and ensuring that decisions are based on current, relevant data.

Why it matters

It indicates the freshness of the data, ensuring that analysts understand how current their process analysis is.

Where to get

This value is typically generated and stamped onto each record during the data extraction and transformation (ETL) process.

Examples
2023-10-26T23:59:59Z2024-01-16T04:00:10Z2023-11-02T01:05:00Z
Source System
SourceSystem
The name or identifier of the system from which the incident data was extracted.
Description

The Source System attribute identifies the origin of the data. In environments with multiple ITSM tools or integrated systems, this field helps distinguish records from different sources.

While not directly used in drawing the process map, this attribute is valuable for data validation and governance. It helps analysts trace data back to its origin, understand potential discrepancies between systems, and segment the analysis. For example, one could compare the incident management processes implemented in two different systems, such as ServiceNow and Jira, within the same organization.

Why it matters

It provides context for the data's origin, which is crucial for data validation, troubleshooting, and comparative analysis in multi-system environments.

Where to get

This is often a static value added during the data extraction process or a field available in the source system's tables.

Examples
ServiceNowJira Service ManagementBMC HelixZendesk
Assigned Agent
AssignedAgent
The individual support agent or user assigned to handle the incident.
Description

The Assigned Agent identifies the specific person responsible for an incident. While the Assigned Group points to the team, the agent is the individual performer working on the resolution.

This attribute allows for a more granular level of performance and workload analysis. By tracking assignments at the agent level, managers can assess individual productivity, identify training needs, and ensure a balanced distribution of work. In process mining, it can reveal complex reassignment patterns that might be hidden at the group level and helps in understanding individual contributions to resolution times.

Why it matters

It enables detailed analysis of individual workload, performance, and reassignment patterns within or between teams.

Where to get

Found on the main incident record, this field is updated when an agent takes ownership or is assigned the incident.

Examples
John SmithJane Doeagent.12345Emily Jones
Assigned Group
AssignedGroup
The support team, queue, or group currently responsible for working on the incident.
Description

The Assigned Group indicates which team is responsible for the incident at any given time. Incidents are often routed between different groups, such as the Level 1 Service Desk, a Level 2 Network team, or a Level 3 Application Support team.

This attribute is essential for handoff and workload analysis. Process mining can use this data to visualize the flow of incidents between teams, measure the time spent in each team's queue, and identify bottlenecks caused by frequent reassignments. It helps answer questions about team efficiency and collaboration, forming the basis for the Handoff and Reassignment Analysis dashboard.

Why it matters

It is critical for analyzing handoffs between teams, measuring queue times, and understanding team-specific performance and workload distribution.

Where to get

This information is typically stored on the incident record and is updated every time the incident is assigned to a new team.

Examples
Service DeskNetwork OperationsDatabase AdministrationApplication Support Tier 2
Incident Category
IncidentCategory
The classification of the incident, often organized in a hierarchical structure (e.g., Hardware > Laptop > Battery).
Description

The Incident Category provides a structured way to classify incidents based on their nature. This is typically a hierarchical field that allows for progressively more detailed classification, helping to organize incidents into logical groups for reporting and analysis.

Categorization is vital for root cause and trend analysis. By analyzing process maps filtered by category, organizations can identify recurring issues and patterns associated with specific types of incidents. For example, the resolution process for a 'Software' incident might look very different from a 'Hardware' incident. This data fuels KPIs like Initial Categorization Accuracy and Recurring Incident Rate.

Why it matters

It is essential for root cause analysis, identifying trends in recurring incidents, and understanding how different types of issues are handled.

Where to get

This is a standard, often mandatory, set of fields on the incident record used for classification.

Examples
Software | Application | Login IssueHardware | Printer | Not RespondingNetwork | Wi-Fi | Slow Connection
Incident Status
IncidentStatus
The current or historical state of the incident within its lifecycle, such as 'New', 'In Progress', or 'Closed'.
Description

The Incident Status indicates the stage of an incident at a specific point in time. It provides a high-level view of where the incident is in the resolution process. Common statuses include new, assigned, work in progress, pending, resolved, and closed.

This attribute is fundamental for process analysis as changes in status often define the activities in the process map. Analyzing the time spent in each status helps identify bottlenecks, such as incidents waiting for long periods in a 'Pending' state. It is also used to calculate the backlog of open incidents and track progress towards resolution.

Why it matters

It is key to understanding the incident's progress and is often used to generate activities for the process map. Analyzing time spent in each status helps locate delays.

Where to get

Typically available as a primary field on the main incident record or in the incident's history log.

Examples
NewIn ProgressPending CustomerResolvedClosed
Priority
Priority
The assigned priority level of the incident, which determines the urgency and order of resolution.
Description

Priority is a key attribute used to determine the relative importance of an incident and the required speed of response. It is often derived from a combination of the incident's impact and urgency. Levels typically range from critical to low.

In process mining, analyzing incidents by priority allows for a deeper understanding of how the process handles different levels of urgency. Analysts can compare the resolution times for high-priority versus low-priority incidents to see if SLAs are being met and if resources are allocated effectively. It helps answer questions like, 'Are we truly handling our most critical incidents the fastest?'

Why it matters

It enables the analysis of process performance for different urgency levels, helping to verify if critical incidents are handled faster than non-critical ones.

Where to get

Available as a standard field on the main incident record. It may be set manually or calculated automatically based on impact and urgency.

Examples
1 - Critical2 - High3 - Medium4 - Low
Reporting Channel
ReportingChannel
The method or channel through which the incident was reported, such as Email, Phone, or Self-Service Portal.
Description

The Reporting Channel indicates the source of the incident submission. This attribute tracks how users are interacting with the support function, whether through direct contact methods like phone calls or automated methods like system monitoring alerts.

Analyzing the process based on the reporting channel can reveal important differences in efficiency. For example, incidents reported via a self-service portal might be resolved faster because they often contain more structured information upfront. This analysis helps organizations optimize their support channels and encourage the use of more efficient methods.

Why it matters

It helps analyze the efficiency and resolution paths of incidents based on their source, which can inform channel strategy and resource allocation.

Where to get

This information is usually captured automatically or selected by the agent when an incident is created.

Examples
EmailPhoneSelf-Service PortalSystem Alert
Resolution Method
ResolutionMethod
A code, category, or description indicating how the incident was ultimately resolved.
Description

The Resolution Method describes the outcome of the incident and how it was resolved. This could be a standardized code or a free-text description of the actions taken. Examples include 'User education', 'Software patch applied', 'No fault found', or 'Duplicate incident'.

This attribute provides crucial context to the end of the process. In process mining, analyzing incidents by their resolution method helps in understanding the effectiveness of different solutions. It can highlight cases that are closed without a real fix or identify common resolution patterns for specific incident categories, which can then be used to build a knowledge base and improve First Contact Resolution rates.

Why it matters

It provides insight into how problems are being solved, which is key for identifying opportunities for automation, knowledge base improvement, and training.

Where to get

Typically a field that is filled out by the support agent upon moving an incident to the 'Resolved' or 'Closed' status.

Examples
Resolved by Service DeskNo Fault FoundDuplicateSoftware Update Deployed
Severity
Severity
The measure of the incident's business impact, indicating how significantly it affects users or services.
Description

Severity defines the level of impact an incident has on the business. It answers the question of how serious the issue is, independent of its urgency. For example, a system-wide outage would be a high-severity incident, while a minor cosmetic bug would be low-severity.

Analyzing incidents by severity helps organizations understand which types of issues cause the most disruption. Process mining can reveal if high-severity incidents follow a different, more streamlined resolution path. This attribute is crucial for root cause analysis and prioritizing resources for proactive problem management to prevent the most severe incidents from recurring.

Why it matters

It helps in segmenting incidents to understand if high-impact issues are resolved differently or more efficiently than low-impact ones.

Where to get

A standard field on the incident record, often used in conjunction with urgency to determine priority.

Examples
1 - High2 - Medium3 - LowCritical
Affected Service
AffectedService
The business service, application, or configuration item (CI) impacted by the incident.
Description

The Affected Service links an incident to a specific component in the IT infrastructure, such as a business application, server, or network device. This is often tied to a Configuration Management Database (CMDB).

This attribute provides critical business context to the incident. In process mining, it allows for analysis focused on the reliability of specific services or assets. Organizations can identify which services generate the most incidents, analyze their resolution processes, and prioritize problem management efforts to improve the stability of critical business services. It's a key element for understanding the broader business impact of IT incidents.

Why it matters

It connects incidents to specific business services or IT components, enabling analysis of which services are most prone to issues and what their impact is.

Where to get

Typically linked from a Configuration Management Database (CMDB) or selected from a service catalog list on the incident form.

Examples
Email ServicesSAP ERP FinancialsCorporate VPNSRV-SQL-01
Reassignment Count
ReassignmentCount
The total number of times the incident has been reassigned to a different agent or group.
Description

The Reassignment Count is a metric that tracks the number of handoffs an incident undergoes during its lifecycle. A high count often indicates inefficiency, incorrect initial routing, or a lack of knowledge within support teams.

This is a powerful attribute for process mining analysis. While process mining can visualize reassignments, having a pre-calculated count allows for easy filtering and KPI measurement. It is used directly in the Handoff and Reassignment Analysis dashboard and helps identify 'ping-pong' scenarios where tickets are passed back and forth between teams, leading to longer resolution times and user frustration.

Why it matters

This metric directly quantifies process inefficiency. High counts often correlate with longer resolution times and indicate issues with routing or team capabilities.

Where to get

Often available as a standard counter field on the incident record. If not, it can be derived by counting the number of assignment changes in the incident's audit log.

Examples
0135
Requester
Requester
The user, employee, or system that initially reported the incident.
Description

The Requester is the individual who is experiencing the issue and initiated the incident report. This could be an internal employee or an external customer. The attribute can also capture the requester's department or organization.

Analyzing incidents by requester or requester department helps identify if specific groups of users are experiencing more issues than others. This can point to training needs or localized environmental problems. In process mining, it enables a user-centric view of the support process, helping to understand the experience of different user cohorts.

Why it matters

It allows for a user-centric analysis, helping to identify if certain users, departments, or locations are generating a disproportionate number of incidents.

Where to get

A standard field on the incident record, typically populated with the user who created the ticket or on whose behalf it was created.

Examples
Alice JohnsonSales Departmentb.williamsCustomer-XYZ Corp
SLA Status
SlaStatus
Indicates whether the incident is within its service level agreement (SLA) targets, at risk, or has breached them.
Description

The SLA Status provides a snapshot of an incident's performance against predefined time targets, such as time to respond or time to resolve. Common statuses include 'In Progress', 'At Risk', or 'Breached'.

This attribute is a direct measure of service quality and is a critical input for the SLA Performance Overview dashboard. In process mining, it allows for the comparison of process flows for breached versus non-breached incidents. This helps to identify the specific activities, delays, or rework loops that are the primary drivers of SLA failures, enabling targeted process improvement efforts.

Why it matters

It is a direct measure of performance against targets. Analyzing breached incidents helps pinpoint the process failures that lead to poor service delivery.

Where to get

This is typically a calculated field within the ITSM tool that is dynamically updated based on the incident's priority, age, and defined SLA rules.

Examples
In ProgressPausedBreachedAt Risk
Required Recommended Optional

Incident Management Activities

This table outlines the essential process steps and key milestones to track, crucial for accurate process discovery and understanding your incident resolution flow.
7 Recommended 7 Optional
ActivityDescription
Group Assigned
Signifies the initial assignment of the incident to a specific support group or team for investigation. This represents the first official handoff and the start of the resolution workflow.
Why it matters

This is a key routing step. Delays in assignment or incorrect routing can significantly increase resolution times and cause unnecessary handoffs between teams.

Where to get

This event is inferred from the audit log by finding the first instance where an 'Assignment Group' or 'Support Team' field is populated.

Capture

Identify the timestamp of the first population of the 'Assignment Group' field in the incident's history.

Event type inferred
Incident Closed
The final activity in the lifecycle, where the incident record is formally closed and becomes a read-only historical record. This often occurs automatically after a set period in the 'Resolved' state.
Why it matters

This marks the absolute end of the incident lifecycle. Analyzing the full time from creation to closure provides a complete view of the process duration, including any post-resolution administrative periods.

Where to get

Captured from an explicit status change to 'Closed' in the incident's history log, which provides a final timestamp.

Capture

Use the timestamp from the audit log when the incident status is updated to 'Closed'.

Event type explicit
Incident Created
This activity marks the formal creation of an incident record in the system. It is the definitive start of the incident lifecycle, capturing the initial report from a user or monitoring tool.
Why it matters

This is the primary start event for the process. Analyzing the time from creation to other milestones is fundamental for measuring overall resolution time and identifying front-end delays.

Where to get

This is typically captured from the creation timestamp of the primary incident or ticket table in the source system.

Capture

Use the 'create_date' or 'submitted_on' timestamp from the main incident record.

Event type explicit
Incident Reopened
Occurs when a previously resolved incident is returned to an active state. This usually happens when the user reports that the issue has recurred or the provided solution was not effective.
Why it matters

A high reopen rate points to issues with resolution quality, incomplete root cause analysis, or premature closure. This is a critical metric for rework analysis.

Where to get

Inferred from the status history when an incident's status changes from 'Resolved' or 'Closed' back to an active state like 'In Progress'.

Capture

Detect a status change from a resolved state to an open state and capture the timestamp of that change.

Event type inferred
Incident Resolved
This activity indicates that a resolution has been implemented and the service is believed to be restored for the user. It is a critical milestone that typically stops the SLA resolution clock.
Why it matters

This is a key endpoint for measuring resolution time. The period between this and final closure is important for analyzing user confirmation delays or auto-closure policies.

Where to get

This is almost always an explicit event captured when an agent changes the incident's status to 'Resolved' or 'Solved'.

Capture

Use the timestamp from the audit log when the incident status is updated to 'Resolved'.

Event type explicit
Investigation Started
Indicates that an assigned agent has started actively working on the incident. This is often represented by a status change from an 'Assigned' or 'New' state to an 'In Progress' state.
Why it matters

This milestone marks the end of the initial queue time and the beginning of active work. Measuring the time to this activity helps understand agent capacity and response delays.

Where to get

This is typically inferred from a status change in the incident's history log.

Capture

Identify the timestamp when the incident status first changes to 'In Progress', 'Work in Progress', or a similar active state.

Event type inferred
SLA Breach Detected
A calculated event that occurs when the time taken to respond to or resolve an incident exceeds the targets defined in its Service Level Agreement (SLA). This is not a manual user action but a result of elapsed time.
Why it matters

SLA breaches are a primary Key Performance Indicator (KPI). Analyzing when and why they occur is critical for improving service delivery and meeting contractual obligations.

Where to get

This event is not directly in logs but is calculated by comparing event timestamps against the SLA target deadlines stored on the incident record.

Capture

Compare the resolution timestamp against the 'SLA Due Date'. If the resolution is later, create a breach event at the SLA due date timestamp.

Event type calculated
Agent Assigned
This activity marks the point when a specific agent takes or is given ownership of the incident. It represents the transition from team-level responsibility to individual accountability.
Why it matters

Tracking agent assignment helps in analyzing individual workloads, performance, and identifying bottlenecks where incidents wait for an available agent.

Where to get

Captured by tracking changes to the 'Assignee' or 'Assigned To' field in the incident's audit log.

Capture

Use the timestamp from the audit log when the 'Assignee' field is first populated or changed to a new user.

Event type explicit
Incident Categorized
Represents the classification of the incident, including setting its category, type, and item. This is a crucial triage step that helps route the incident and apply the correct resolution procedures.
Why it matters

Incorrect categorization can lead to delays, reassignments, and skewed reporting. Analyzing this activity helps assess the quality of the initial triage process and its impact on resolution efficiency.

Where to get

This event is usually inferred from the audit log or history table by identifying the first time categorization-related fields are populated.

Capture

Detect the first update to fields like 'Category', 'Subcategory', or 'Configuration Item' after the incident is created.

Event type inferred
Incident Prioritized
This activity occurs when the priority of the incident is set, typically based on its impact and urgency. The priority level dictates the target response and resolution times according to Service Level Agreements (SLAs).
Why it matters

Prioritization directly influences resource allocation and the order in which incidents are addressed. Analyzing this step helps ensure that critical incidents receive attention first and SLAs are met.

Where to get

This is captured by monitoring the audit trail for changes to the 'Priority' or 'Severity' field.

Capture

Use the timestamp from the audit log associated with the update of the 'Priority' field.

Event type explicit
Incident Reassigned
Represents the transfer of an incident from one support group or agent to another. This handoff often occurs when the initial team cannot resolve the issue and requires different expertise.
Why it matters

Frequent reassignments are a strong indicator of process inefficiency, incorrect initial routing, or gaps in team knowledge. Analyzing these handoffs is key to streamlining the resolution flow.

Where to get

Inferred from the audit log by detecting any change in the 'Assignment Group' or 'Assignee' field after the initial assignment.

Capture

Capture a new event for every change to the 'Assignment Group' field after it was first populated.

Event type inferred
Status Changed To Pending
Occurs when progress on an incident is paused, usually while waiting for information from the user, a vendor, or another external dependency. This state typically pauses the SLA clock.
Why it matters

Analyzing time spent in a pending state highlights external dependencies and delays. Excessive pending time can mask internal inefficiencies and distort resolution time metrics.

Where to get

Inferred from the incident's status history when it is changed to a 'Pending', 'On Hold', or 'Awaiting User' status.

Capture

Capture the timestamp each time the incident status changes to any designated 'pending' state.

Event type inferred
Work Resumed
Marks the point where an incident that was on hold is reactivated. This typically happens when the required information is received, allowing the support agent to continue their work.
Why it matters

This activity is crucial for accurately measuring the duration of external waits. The time between 'Pending' and 'Resumed' shows how long the process was stalled due to outside factors.

Where to get

Inferred from the incident's status history when it moves from a 'Pending' state back to an 'In Progress' or other active state.

Capture

Capture the timestamp when an incident's status changes from a 'pending' state back to an active one.

Event type inferred
Workaround Provided
Signifies that a temporary solution has been communicated to the user to restore service functionality. This mitigates the business impact while a permanent fix is being developed.
Why it matters

Providing a workaround is a key step in managing major incidents. It allows tracking the time to mitigation separately from the time to permanent resolution.

Where to get

This can be an explicit status or flag, but is often inferred from agent notes or communications logs using keyword analysis.

Capture

Identify through a specific status like 'Workaround Provided' or by searching for keywords like 'workaround' or 'temporary fix' in agent comments.

Event type inferred
Recommended Optional

Extraction Guides

How to get your data for process mining.

Extraction methods vary by system. For detailed instructions,

read our ETL guide

or select a specific process and system.