When the CMDB lies: governed CI-owner fixes that actually execute
A recurring ITSM pain: incidents and changes get routed to the wrong team because the CMDB “support group / CI owner” fields drift after org changes, app migrations, or discovery/import mismatches. The service desk sees the symptom (misrouted tickets, SLA breaches), but the fix requires coordinated updates across ITSM + identity + comms—and that’s where “AI suggestions” often stop.
This draft proposes Autom Mate as the execution + control layer: AI can recommend the right owner/group, but Autom Mate enforces policy, collects approvals, executes deterministic updates, and logs everything.
The end-to-end workflow (one blueprint)
1) Trigger
- Trigger: A new P1/P2 incident is created (or re-assigned twice within 30 minutes) and the linked CI’s assignment group doesn’t match the on-call roster.
- Source systems:
- ITSM: ServiceNow / TOPdesk / Xurrent (ticket + CI reference)
- Collaboration: Teams (for approvals + notifications)
2) Validation (context + policy checks)
- Pull ticket + CI context (CI name, current owner, assignment group, last updated timestamp).
- Validate against policy:
- Only allow changes for specific CI classes (e.g., “Business App”, “API Gateway”, “Database”).
- Block changes if there’s an active major incident or an in-flight change window.
- Require evidence: “Why is this owner wrong?” (e.g., org chart change, app moved to new platform).
- Optional AI assist (non-executing):
- Suggest likely owner/team based on recent ticket history and KB patterns.
- Important: AI does not write to ITSM directly.
3) Approval (human or rule-based)
- If the change is low-risk (e.g., only updating CI “support group” field):
- Route to a predefined approval group (Service Desk Leads / CMDB Stewards).
- If higher-risk (e.g., changing CI owner + downstream routing rules):
- Require Change Manager approval and notify impacted resolver group.
4) Deterministic execution across systems (Autom Mate runs it)
- Autom Mate execution layer performs the updates in a controlled sequence:
- Update CI ownership / support group in ITSM (Autom Mate library where available; otherwise REST/HTTP/Webhook action).
- Update ticket routing rules / assignment group if needed.
- Post a Teams message to the incident channel with “what changed + why + who approved”.
Autom Mate is designed to orchestrate across ITSM + comms tools (e.g., ServiceNow/TOPdesk/Xurrent + Teams) and run end-to-end service flows with approvals and execution, not just suggestions. it note back to the ticket/CI:
- Old value → new value
- Approver identity
- Run ID / timestamp
- Keep run history with retry visibility (so you can prove what happened when APIs fail mid-flight).
6) Exception handling / rollback
eeds but downstream steps fail (e.g., notification fails):
- Retry with deterministic backoff.
- If still failing, open a “CMDB Automation Exception” task assigned to the platform team.
- If the update is later found incorrect:
- Provide a rollback path: revert CI fields to previous values using the stored “before” snapshot.
Why governance matters (AI vs execution)
- Risk: letting an AI agent directly change CMDB ownership can silently break routing, approvals, and compliance reporting.
- Guardrail: AI can propose; Autom Mate enforces approvals + policy checks + deterministic execution and keeps a full audit trail.
- This is especially relevant because unreliable CMDB data in routing and slower resolution. (salesforce.com) (ezo.io)
Two mini examples
Mini example 1: “Wrong resolver group after re-org”
- Incident created for CI = “Payroll API”. Assignment group points to “Apps-Team-A” (deprecated).
- Autom Mate detects mismatch (group no longer on-call) → requests approval from CMDB Stewards → updates CI support group to “Apps-Team-B” → re-routes the incident and posts the audit note.
Mini example 2: “Change approvals stuck because CI owner is stale”
- A standard change requires CI owner approval, but the CI owner left the company.
- Autom Mate validates the owner is inactive, routes approval to a fallback group, updates CI owner after approval, and re-triggers the approval step with the correct approver.
Discussion questions
- Where do you draw the line between auto-approval (low-risk CI field updates) vs mandatory human approval?
- Would you rather fix routing by updating the CI (source of truth) or by applying a ticket-only override (fast but potentially hides CMDB debt)?