Governed CMDB enrichment for better incident routing (without letting AI write to CMDB)
Service desks keep trying “AI triage” for incidents, but the real failure mode is upstream: the ticket gets created with missing/incorrect CI + ownership, so it bounces between resolver groups and MTTR climbs. Stale CMDB relationships and unclear ownership are a common root cause of reassignment loops and slow impact analysis. (ltm.com)
The tricky part: letting an LLM directly update CMDB fields (CI, service, assignment group, relationships) is risky—one hallucinated CI link can trigger the wrong on-call, wrong change freeze, or wrong remediation.
This topic proposes a pattern where:
- AI can suggest enrichment
- Autom Mate is the deterministic execution + control layer that validates, enforces policy, routes for approval, and then performs the updates with full auditability
End-to-end workflow: “Incident created → governed CMDB enrichment → deterministic routing”
1) Trigger
- Trigger: New Incident created in ServiceNow (or TOPdesk/Xurrent) with low-confidence CI/service/assignment group.
- **How it e - ServiceNow outbound event/webhook → Autom Mate Webhook (REST/HTTP/Webhook action).
2) Validation (context + policy checks)
- Pull ticket context (short description, caller, location, affected service, current CI if any).
- Enrich with authoritative sources (don’t trust the ticket text alone):
- Query inventory/discovery source (e.g., Lansweeper) and/or monitoring context.
- Query CMDB for candidate CIs and relationships.
- Apply policy-as-code style checks before any write:
- Only allow CI updates if confidence ≥ threshold and CI is in allowed classes
- Block updates for “regulated services” unless approved
- Require “owner present” before assigning to a resolver groupts adding knowledge & policies to shape behavior and governance.
3) Approval (human or rule-based)
- If the change is “safe” (e.g., adding a missing CI reference with high confidence), allow auto-approval.
- If the change is “risky” (e.g., changing Business Service, re-parenting relationships, or touching high-impact CIs), request approval:
- Send age to Microsoft Teams (Autom Mate library).
- Approver chooses: Approve / Reject / Request more evidence
4) Deterministic execution across systems
- Autom Mate executes the approved actions in a controlled sequence:
- Update ServiceNow incident fields (CI, service, assignment group)
- (Optional) Create/Update a CMDB task or CI relationship correction record
- Post back a comment to the incident with “what changed + why + evidence links”
Autom Mate is designed to connect ITSM + channels and o workflows across systems.
Integration labeling (per action):
- ServiceNow: Autom Mate library (preferred) if available in your tenant; otherwise REST/HTTP/Webhook action
- Teaary**
- Inventory/Discovery/Monitoring: Autom Mate library if available; otherwise REST/HTTP/Webhook action
5) Logging / audit
- Log every step:
- Inputs used (ticket fields, CMDB candidates)
- Policy decisions (why auto-approved vs escalated)
- Approver identity + timestamp
- Exact fields written + before/after
Autom Mate provides monitoring/log visibility for executions and supports audit-ready operations.
6) Exception handling / rollback
- If ServiceNow update fails (4xx/5xx), stop and:
- Revert any partial updates (idempotent “set-to-known-good”)
- Notify in Teams with the failure reason and a “Retry” button
- If enrichment confidence is low or sources disagree:
- Create a “CMDB Data Quality” task and attach evidence
- Leave incident routing unchanged (don’t guess)
Why this is an AI governance problem (not just automation)
- AI is great at reading messy ticket text and proposing likely CIs/owners.
- AI is not reliable enough to be the system-of-record writer for CMDB/ITSM fields.
- Autom Mate sits between AI and enterprise systems as the execution + control layer:
- deterministic steps
- approvals
- policy enforcement
- full audit trail
This helps avoid “agentic” changes based on stale/incorrect CMDB data—one of the reasons routing and impact analysis break down in the first place. (ltm.com)
Two mini examples
Mini example 1: “Wrong resolver group due to missing CI owner”
- Incident comes in: “VPN slow” with no CI.
- Autom Mate enrichment finds the VPN gateway CI and its support group.
- Policy: if CI owner exists and confidence high → auto-approve.
- Autom Mate updates incident assignment group and adds a comment with evidence.
Mini example 2: “High-risk service mapping change requires approval”
- Incident suggests a Business Service change (could affect reporting/SLAs).
- Autom Mate flags as high-risk and requests approval in Teams.
- On approval, Autom Mate updates ServiceNow fields; on rejection, it logs the decision and opens a CMDB correction task.
Discussion questions
- Where do you draw the line for auto-approved enrichment vs human approval (CI field vs Business Service vs relationships)?
- What evidence do you require in the audit log to feel comfortable that enrichment was deterministic and defensible?