Incident Management

To create data sources for Incident Management, perform the following steps.

  1. On the left menu bar, click Configuration 🡪 Manage Data Sources.
  2. The Create Data Source page appears with the following tabs:
    1. Organization
    2. Fetch Data
    3. Release Rules
    4. Close Rules
    5. InProgress Rules
    6. Assignation
    Figure 1. Create Data Source
    Note:
    Release Rules are only applicable for the following Module types- Incident Management, Change Request Task and Service Request Task. This tab will not be activated for other module types.
  3. On the Organization tab,
    • Select the Module as Incident Management, since we are configuring this data source for pulling the incident tickets.
    • Select the Service as SX Tool as we are configuring the data source for Cherwell
    • Select the Integration Type as REST, since we will be integrating through REST APIs.
    • Select the Timezone to specify the time zone of the selected data source.
    • Select Timestamp to view the present data with date and time.
    • Click Next.
    Figure 2. Create Data Source (Cont.)
    Figure 3. Create Data Source (Cont.)
  4. On the Fetch Data tab, type in the details as per the environment.
  5. In the Connection Details section, enter the following details:
    1. URL – Type the URL which contains the placeholders that display the parameters based on the applied clause such as the number of records to be fetched, query type, date on which the data is fetched, and the order by and so on. It depends on the URL or API provided by the tool.

      Sample URL – http://<Product_API_URL>/iAutomateAPI/Request/ GetIncidentTicketData/<Org_ID>?ModuleId=1&start_date>=#Start_Date#&end_date<=#End_Date#&

      Here, <Product_API_URL > is the API URL of iAutomate where Push APIs are present and <Org_ID> is the OrgID for the organization for which you are creating the data source. It is available in Organization Master in Database.

    2. Authentication Type – Select one of the Authentication Types from Basic / Windows, OAuth 2.0
      Note:
      The user details that are entered here should be an API User
      1. Selection of Basic / Windows requires you to enter -
        • User Id
        • Password.
      2. Selection of OAuth 2.0 requires you to enter -
        • User Id
        • Password
        • Authentication URL
    3. Proxy Required – Check Proxy Required, if the environment needs access to content from data sources outside the firewall.
    4. Click on Test Connection to check accessibility of URL from service. Testing the connection is not mandatory, you can still create Data source.
      Figure 4. Create Data Source (Connection Details)
      A screenshot of a computer Description automatically generated
  6. Password - For password, click on icon next to it. If the password is available in plaintext, then select Input type as Input Text and enter the password in Value field. Else if it is available in Azure Key Vault then select Input Type as Azure Key Vault and then select any of the configured details from the value field. Else if it is available in any Key Vault such as CyberArk or Secret Manager then select Input Type as CyberArk or Secret Manager respectively and then select any of the configured details from the value field.
    Figure 5. Password in plaintext
    A screenshot of a login box Description automatically generated
    Figure 6. Password from Key Vault (CyberArk)
    A screenshot of a computer Description automatically generated
    Figure 7. Password from Secret Manager
    A screenshot of a computer Description automatically generated
    Figure 8. Password from Azure Key Vault
    A screenshot of a computer Description automatically generated
  7. Request Authentication Parameters – If the user has additional parameters, click Add Authentication Parameters under the Request Authentication Parameters Tab. Based on the Authentication Type, add the parameters mentioned in the below table.

    Sample Authentication Parameters

    Authentication Type Key Value Is Encrypted? Is Key?
    OAuth2.0 username <username> NO YES
    OAuth2.0 password <password> YES YES
    OAuth2.0 AuthMethod POST NO NO
    OAuth2.0 AuthPrefix Bearer NO NO
    OAuth2.0 client_id <clientID> YES YES
    OAuth2.0 client_secret <clientsecret> YES YES
    OAuth2.0 TokenKey access_token NO NO
    OAuth2.0 ResponseType JSON NO NO
    OAuth2.0 grant_type Password NO YES
    Figure 9. Create Data Source (Request Authentication Parameters for OAuth2.0)
    A screenshot of a computer Description automatically generated
  8. URL Path Parameters – Based on the URL entered earlier, please map the values to the URL Path Parameters. E.g., for the URL entered earlier, please populate the below inputs:

    URL Path Parameters

    Key Value Type Value
    #start_date# SQL UDF @@GetFromDateTimeUsingIncidentModifiedDate_ServiceXchange
    #end_date# SQL UDF @@GetToolCurrentDateTime_ServiceXchange
    Figure 10. URL Path Parameters
    A screenshot of a computer Description automatically generated
  9. Request Header Parameters – Please enter the request header parameters as required.
  10. Response Body – In this section, please enter the output of URL query for one of the incidents in JSON format. A sample response is mentioned below:
    {
    "statusCode": 200,
    "status": "Success",
    "message": null,
    "result": [
    {
    "TicketNumber": "INC0303869",
    "Summary": "testing",
    "Description": "testing data",
    "AssignedGroup": "xxxxxxxx",
    "StatusCode": "1",
    "CreationDate": "2022-09-23 09:26:52.000",
    "LastModifiedDate": "2022-09-23 09:26:52.000",
    "ClosedDate": "2022-09-22 06:24:52.000",
    "sys_id": "xxxxxxxx",
    "Col1": "",
    "Col2": "",
    "Col3": "",
    "Col4": "",
    "Col5": "",
    "Col6": "",
    "Col7": "",
    "Col8": "",
    "Col9": "",
    "Col10": "",
    "iAutomate_CreatedDateInGMT":"2022-09-23 09:27:22.773",
    "iAutomate_UpdatedDateInGMT": "2022-09-23 09:27:22.773"
    }
    ]
    }
  11. After entering the response, click Extract Keys to add the parameters in the Mandatory Parameter Mapping section.
  12. Mandatory Parameter Mapping – Please map the mandatory parameters to the respective values as mentioned in the screenshot below:

    Sample Mandatory Parameter Mapping

    Key Value Type Value
    TicketNumber JSON.Keys result.0.TicketNumber
    Summary JSON.Keys result.0.Summary
    Description JSON.Keys result.0.Description
    CreationDate JSON.Keys result.0.CreationDate
    StatusCode JSON.Keys result.0.StatusCode
    ResolvedDate JSON.Keys result.0.ClosedDate
    LastModifiedDate JSON.Keys result.0. LastModifiedDate
    Figure 11. Mandatory Parameter Mapping
    A screenshot of a computer Description automatically generated
  13. If you need to add Optional parameters, click Add Response Parameter to add more parameters. For our purpose, we will be adding a couple of extra parameters, as mentioned below, as we need them in the later section.

    Sample Optional Parameters

    Key Value Type Value
    AssignedGroup JSON.Keys result.0. AssignedGroup
    Figure 12. Optional Parameter Mapping
  14. Click Next to proceed to Release Rules.
  15. On the Release Rules tab, type in the details as per the requirement.
  16. In the Connection Details section, enter the following details:
    1. URL – Type the URL of the selected service type to release the ticket. It contains the placeholders that display the parameters based on the applied clause and is dependent on the URL or API provided by the tool.

      Sample URL: https://inboundBoomiDevCHN1.mycompany.com/ws/simple/updateIncidentInSX

    2. Authentication Type – Please enter the information in line with the Authentication type configured for fetching data configuration previously. For e.g., Basic.
    3. Request Method – Select Request Method as POST from the drop-down.
    4. Proxy Required – Check Proxy Required, if the environment needs access to content from data sources outside the firewall.
      Figure 13. Release Rules (Connection Details)
      A screenshot of a computer Description automatically generated
    5. Password - For password, click on icon next to it. If the password is available in plaintext, then select Input type as Input Text and enter the password in Value field. Else if it is available in Azure Key Vault then select Input Type as Azure Key Vault and then select any of the configured details from the value field. Else if it is available in any Key Vault such as CyberArk or Secret Manager then select Input Type as CyberArk or Secret Manager respectively and then select any of the configured details from the value field.
    Figure 14. Password in Plaintext
    A screenshot of a login box Description automatically generated
    Figure 15. Password from Key Vault (CyberArk)
    A screenshot of a computer Description automatically generated
    Figure 16. Password from Secret Manager
    A screenshot of a computer Description automatically generated
    Figure 17. Password from Azure Key Vault
    A screenshot of a computer Description automatically generated
  17. Request Authentication Parameters - If the user has additional parameters, click Add Authentication Parameters under the Request Authentication Parameters tab.
  18. Based on the Authentication Type, add the parameters mentioned in the below table

    Sample Authentication Parameters

    Key Value Is Encrypted? Is Key?
    grant_type password N Y
    username <username> N Y
    Password <password> Y Y
    client_id <client_id> N Y
    AuthPrefix Bearer N N
    AuthMethod POST N N
    ResponseType JSON N N
    TokenKey access_token N N
    Figure 18. Create Data Source (Request Authentication Parameters)
    A screenshot of a computer Description automatically generated
  19. Request Body - In this section, please enter the request body in JSON format. A sample request is mentioned below:
    Request Body –
    {
    "ticketnumber": "#ticket#",
    "status": "#status#",
    "worknote": "#worknote#",
    "assignmentgroup":"#assignmentgroup#",
    "clientName": "#clientname#",
    "clientItemNumber": "#clientitenumber#"
    }
    Figure 19. Request Body
    A screenshot of a computer Description automatically generated
  20. Response Body – In this section, please enter the response body in JSON format. A sample request is mentioned below:
    Response Body –
    { "result" : "#success#" }
    Figure 20. Release Rules (Response Body)
    A screenshot of a computer Description automatically generated
  21. Response Key Value mapping can be done as per the below table.

    Sample Response Key Value Mapping

    #success# Text OK
  22. Click Save to add the data source.
  23. On Close Rules tab, type in the details as per the requirement.
  24. In the Connection Details section, enter the following details:
    1. Type the URL of the selected service type to release the ticket. It contains the placeholders that display the parameters based on the applied clause and is dependent on the URL or API provided by the tool.

      Sample URL - https://url.servicenow.com/api/now/v1/table/sc_request?sysparm_fields=#Columnshost>

    2. Authentication Type – Please enter the information in line with the Authentication type configured for fetching data configuration previously. For example, Basic.
    3. Request Method – Select Request Method as POST from the drop-down.
    4. Proxy Required – Check Proxy Required, if the environment needs access to content from data sources outside the firewall.
      Figure 21. Close Rules (Connection Details)
      A screenshot of a computer Description automatically generated
    5. Proxy Required – Check Proxy Required, if the environment needs access to content from data sources outside the firewall.
    6. Password - For password, click on icon next to it. If the password is available in plaintext, then select Input type as Input Text and enter the password in Value field. Else if it is available in Azure Key Vault then select Input Type as Azure Key Vault and then select any of the configured details from the value field. Else if it is available in any Key Vault such as CyberArk or Secret Manager then select Input Type as CyberArk or Secret Manager respectively and then select any of the configured details from the value field.
      Figure 22. Password in Plaintext
      A screenshot of a login screen Description automatically generated
    Figure 23. Password from Key Vault (CyberArk)
    A screenshot of a computer Description automatically generated
    Figure 24. Password from Secret Manager
    A screenshot of a computer Description automatically generated
    Figure 25. Password from Azure Key Vault
    A screenshot of a computer Description automatically generated
  25. Request Authentication Parameters - If the user has additional parameters, click Add Authentication Parameters under the Request Authentication Parameters tab.
  26. Based on the Authentication Type, add the parameters mentioned in the table below

    Sample Authentication Parameters

    Key Value Is Encrypted? Is Key?
    grant_type password N Y
    username <username> N Y
    Password <password> Y Y
    client_id <client_id> N Y
    AuthPrefix Bearer N N
    AuthMethod POST N N
    ResponseType JSON N N
    TokenKey access_token N N
    Figure 26. Create Data Source (Request Authentication Parameters)
    A screenshot of a computer Description automatically generated
  27. Request Body - In this section, please enter the request body in JSON format. A sample request is mentioned below:
    Request Body –
    {
    "ticketnumber": "#ticket#",
    "status": "#status#",
    "worknote": "#worknote#",
    "clientName": "#clientname#",
    "clientItemNumber": "#clientitenumber#"
    }
    Figure 27. Close Rules (Request Body)
    A screenshot of a computer Description automatically generated
  28. Response Body – In this section, please enter the response body in JSON format. A sample request is mentioned below:
    Response Body –
    { "result" : "#success#" }
    Figure 28. Close Rules (Response Body)
    A close up of a text Description automatically generated
  29. Response Key Value mapping can be done as per the table below.

    Sample Response Key Value Mapping

    #success# Text OK
  30. Click Save to add the data source.
  31. On the InProgress Rules tab, type in the details as per the requirement.
  32. In the Connection Details section, enter the following details:
    1. URL – Type the URL of the selected service type to release the ticket. It contains the placeholders that display the parameters based on the applied clause and is dependent on the URL or API provided by the tool.

      Sample URL - https://<ipaddress>:<port>

    2. Authentication Type – Please enter the information in line with the Authentication type configured for fetching data configuration previously. For example, Basic.
    3. Request Method – Select Request Method as POST from the drop-down.
    4. Proxy Required – Check Proxy Required, if the environment needs access to content from data sources outside the firewall.
    5. Password - For password, click on icon next to it. If the password is available in plaintext, then select Input type as Input Text and enter the password in Value field. Else if it is available in Azure Key Vault then select Input Type as Azure Key Vault and then select any of the configured details from the value field. Else if it is available in any Key Vault such as CyberArk or Secret Manager then select Input Type as CyberArk or Secret Manager respectively and then select any of the configured details from the value field.
    Figure 29. Password in Plaintext
    A screenshot of a login box Description automatically generated
    Figure 30. Password from Key Vault (CyberArk)
    A screenshot of a computer secret selection Description automatically generated
    Figure 31. Password from Secret Manager
    A screenshot of a computer Description automatically generated
    Figure 32. Password from Azure Key Vault
    A screenshot of a computer Description automatically generated
  33. Request Authentication Parameters - If the user has additional parameters, click Add Authentication Parameters under the Request Authentication Parameters tab.
  34. Based on the Authentication Type, add the parameters mentioned in the table below

    Sample Authentication Parameters

    Key Value Is Encrypted? Is Key?
    grant_type password N Y
    username <username> N Y
    Password <password> Y Y
    client_id <client_id> N Y
    AuthPrefix Bearer N N
    AuthMethod POST N N
    ResponseType JSON N N
    TokenKey access_token N N
    Figure 33. Create Data Source (Request Authentication Parameters)
    A screenshot of a computer Description automatically generated
  35. Request Body - In this section, please enter the request body in JSON format. A sample request is mentioned below:
    Request Body –
    {
    "ticketnumber": "#ticket#",
    "status": "#status#",
    "worknote": "#worknote#",
    "clientName": "#clientname#",
    "clientItemNumber": "#clientitemnumber#"
    }
    Figure 34. Request Body
    A white background with text Description automatically generated with medium confidence
  36. Response Body – In this section, please enter the response body in JSON format. A sample request is mentioned below:
    Response Body –
    { "result" : "#success#" }
    Figure 35. InProgress Rules Configuration (Response Body)
    A close-up of a computer screen Description automatically generated
  37. Response Key Value mapping can be done as per the table below.

    Sample Response Key Value Mapping

    #success# Text OK
Assignation Rules
  1. On the Assignation Rules tab, type in the details as per the requirement. Check Same as Release of similar configurations as mentioned in “Release Rules Configuration” are required, else proceed ahead.
  2. In the Connection Details section, enter the following details:
    1. URL – Type the URL of the selected service type to release the ticket. It contains the placeholders that display the parameters based on the applied clause and dependent on the URL or API provided by the tool.
    2. Sample URL - https://<url>.service-now.com/api/now/table/incident/#incident#
    3. Authentication Type – Please enter the information in line with the Authentication type configured for fetching data configuration previously.
    4. User Id - Enter the user id for the configured ITSM tool.
    5. Password - For password, click on the icon next to it. If the password is available in plaintext, then select Input type as Input Text and enter the password in Value field. Else if it is available in Azure Key Vault then select Input Type as Azure Key Vault and then select any of the configured details from the value field. Else if it is available in any Key Vault such as CyberArk or Secret Manager then select Input Type as CyberArk or Secret Manager respectively and then select any of the configured details from the value field.
      Figure 36. Password in Plaintext
      A screenshot of a password selection AI-generated content may be incorrect.
      Figure 37. Password from Key Vault (CyberArk)
      Figure 38. Password from Secret Manager
      Figure 39. Password from Azure Key Vault
      A screenshot of a computer Description automatically generated
    6. Request Method – Select Request Method as PUT from the drop-down.
    7. Proxy Required – Check Proxy Required, if the environment needs access to content from data sources outside the firewall.
      Click on Test Connection to check accessibility of URL from service. Testing the connection is not mandatory, you can still create a Data source.
      Figure 40. Assignation Rules (Connection Details)
    8. URL Path Parameters – Based on the URL entered earlier, please map the values to the URL Path Parameters.
    9. Request Header Parameters – Please enter the request header parameters as required.
    10. Request Body – In this section, please enter the request body in JSON format. A sample request is mentioned below:
      Request Body –
       {"assignment_group":"#Assignment_Group#","assigned_to":"#Assigned_To#","work_notes" : "#worknotes#"}
      Figure 41. Assignation Rules (Request Body)
    11. Response Body – In this section, please enter the response body in JSON format. A sample response is mentioned below:
      Response Body –
      { "result" : "#success#" }
      Figure 42. Assignation Rules (Response Body)
    12. Response Key Value mapping can be done as per the below table:
      Table 1. Sample Response Key Value Mapping
      #success# Text OK
  1. Click Save to add the data source.
  2. To bring the tickets within iAutomate scope, a specific queue needs to be configured in the ITSM tool and same has to be configured in iAutomate. This is achieved through Manage the Entry Criteria. Please follow the below steps:
    1. Go to Configuration and click Manage Data Sources.
    2. On the Data Sources tab, click next to the data source user wants to manage. Manage Entry Criteria screen appears.
      Figure 43. Manage Entry Criteria
    3. Select ‘AssignedGroup’ for the Column field and ‘equals to’ for the Operator field.
    4. Enter the sys_id of the assignment group in SX in the Value field.
    5. Clause and Sub-Clause fields can also be added based on requirement.
      Figure 44. Manage Entry Criteria (Cont.)
      A black line on a white background Description automatically generated
    6. Click Save.
  3. To configure the rules for the data source created earlier, perform the below steps:
    1. Go to Runbooks → click Manage Rules.
    2. Select the Organization and the data source created from Data Source dropdown.
      Figure 45. Manage Rules
    3. Click on corresponding to –No Rule—
    4. Map the parameter #Assignmentgroup# with ElasticOps Rhythm ROW as value and value Type is Text.
    5. Map the parameter #ticket# with iIncident.TicketNumber as value and value type is Table Columns.
    6. Map the parameter #status# with Assigned as value and text as Value Type.
    7. Map the parameter #clientname# with DB Cheques as value and text as Value Type.
    8. Map the parameter #clientitemnumber# with iIncident.TicketNumber as value and table column as Value Type.
    9. Map the parameter #worknote# with @@GetReleaseWorkNoteForIncident as Value and SQL UDF as Value Type.
    10. Click OK.
      Figure 46. Manage Rules (Cont.)
      A screenshot of a computer Description automatically generated
    11. Click the OK Rule.
  4. To configure the Close rules for the data source created earlier, perform the below steps:
    1. Go to select Runbooks 🡪 click Manage Rules.
    2. Select the Organization and the data source created from Data Source dropdown.
      Figure 47. Manage Rules
    3. Click on corresponding to –No Rule—
    4. Map the parameter #ticket# with iIncident.TicketNumber as value and value type is Table Columns.
    5. Map the parameter #status# with Fixed as value and text as Value Type.
    6. Map #worknote# again to the value type as SQL UDF in which #worknote# was mapped with function @GetToolWorkNoteForIncident.
    7. Map the parameter #clientname# with DB Cheques as value and text as Value Type.
    8. Map the parameter #clientitemnumber# with iIncident. TicketNumber as value and table column as Value Type
      Figure 48. Manage Rules (Cont.)
      A screenshot of a computer Description automatically generated
    9. Click OK.
    10. Click Save Rule.
  5. To configure the InProgress rules for the data source created earlier, perform the following steps:
    1. Go to Runbooks 🡪 click Manage Rules.
    2. Select the data source created from Data Source dropdown.
      Figure 49. Manage Release Rules
    3. Click on corresponding to –No Rule—
    4. Map the parameter #ticket# with iIncident.TicketNumber as value and value type is Table Columns.
    5. Map the parameter #status# with InProgress as value and text as Value Type.
    6. Map the parameter #worknote# with iAutomate is working on the ticket as Value and text as Value Type.
    7. Map the parameter #clientname# with DB Cheques as value and text as Value Type.
    8. Map the parameter #clientitemnumber# with iIncident.TicketNumber as value and table column as Value Type.
      Figure 50. Manage Rules (Cont.)
      A screenshot of a computer Description automatically generated
    9. Click OK.
    10. Click Save Rule.

    Integration with Event Management Tools:

    Any Event Management tool acts as a data source for iAutomate from where it pulls the event or Probable Root Cause data and then performs appropriate actions for resolution. Thus, to enable integration with Event Management, it requires a data source to be created as part of iAutomate configuration.

    Before proceeding with the configuration related to Data Source creation, the user must ensure that an organization has been configured. If not done already, please refer to the Configuration Guide for the same and create the organization before proceeding ahead.

    Please note that for integration with Event Management tool; while creating the organization, users need to select the Event Management tool from the dropdown.