When duplicate incidents flood the desk, who’s allowed to merge—and who actually executes it?
A pattern we keep seeing in enterprise ops: monitoring + user reports generate multiple incidents for the same underlying outage, and the service desk ends up doing “ticket archaeology” instead of restoration.
- Agents manually search for related tickets
- Someone links/merges a few… but not consistently
- Major Incident comms go out from one record while work happens in another
- Post-incident reporting is messy because the “system of record” is fragmented
This isn’t a theoretical problem—incident correlation and duplicate incident tracking is a known ITSM pain point, and vendors build features specifically to reduce duplicate work and speed MTTR. (docs.bmc.com)
The tricky part: you don’t want an AI agent to start merging/closing incidents directly in ITSM based on a probabilistic guess. That’s how you lose auditability and create trust issues.
What you wgest* likely duplicates
- Autom Mate to be the deterministic execution + governance layer that enforces policy, approvals, and logging before anything changes in ITSM
Proposed governed workflow (end-to-end)
1) Trigger
- Trigger: New Incident creat Freshservice) with category = “Email / Collaboration” and impact ≥ “Department”.
- Autom Mate trigger type: Event-based trigger (webhook from ITSM)
Integrations
- HaloITSM: REST/HTTP/Webhook action (fallback)
2) Validation (context + policy checks)
Autom Mate builds a “candidate duplicate set” using deterministic checks first:
- Same service / CI (if present)
- Same error signature keywords (e.g., “SMTP”, “Exchange”, “mail flow”, specific error codes)
- Same site/region
- Time window (e.g., last 60 minutes)
Then it optionally calls an LLM to produce a structured match fingerprint (component, symptom, scope) without executing anything.
Guardrails
- If confidence < threshold (e.g., 0.85), do **not to human triage.
- Validate required fields (service, impact, reporter) before proceeding using Autom Mate validation/conditions.
Integrations
- LLM / internal classifier: REST/HTTP/Webhook action (fallback)
3) Approval (human or rule-based)
Autom Mate posts a merge proposal to a dedicated Microsoft Teams channel:
- “Primary incident” candidate
- List of suspected duplicates
- Evidence summary (matching fields + fingerprint)
- Buttons: Approve merge, Reject, Escalate to Major Incident Manager
This keeps AI probabilte from the actual change in ITSM.
Integrations
- Microsoft Teams: Autom Mate library (preferred)
4) Deterministic execution across systems
If approved, Autom Mate executes a controlled sequence:
- Add “Duplicate of INC-XXXX” link on each duplicate
- Move duplicates to a standard state (e.g., “Linked / Monitoring”) rather than closing immediately
- Copy key diagnostics into the primary incident
- Update the primary incident with “Known duplicates linked: N”
- If a Major Incident is declared, ensure comms reference the primary record only
Execution safety
- Idempotency key: (primary_incident_id + duplicate_incident_id) so re-runs don’t double-link
- Retries with backoff for transient ITSM API failures
Integrations
- HaloITSM / Freshservice: REST/HTTP/Webhook action (fallback)
5) Logging / audit
Autom Mate logs:
- The suggestion inputs (what fields matched)
- The approval decision (who/when)
- Every ITSM update action (request/response metadata)
This is the “why” behind the merge, not just the fact that it happened—critical for audits and post-incident reviews. Autom Mate is explicitly positioned as the orchestration fabric with policy guardrails and audit logs.
6) Exception handling / rollback
If execution partially fails (e.g., 7 of 10 duplicates linked):
- Autom Mate routes to an exception path
- Posts a Teams message tagging the on-call service desk lead
- Optionally rolls back by removing links added in this run (only if your policy allows)
Autom Mate supports structured error handling and alerting on failed executions.
Two mini examples
Mini example A: “Email outage” ticket storm
- 40 users report “can’t send email” within 15 minutes.
- Autom Mate proposes 1 primary + 39 duplicates.
- Teams approval granted by the Major Incident Manager.
- Autom Mate links all duplicates, updates the primary with scope, and keeps comms consistent.
Mini example B: Monitoring + user tickets collide
- Monitoring creates an incident for “Mail queue depth high”.
- Users create incidents for “emails delayed”.
- Autom Mate correlates and proposes linking user incidents to the monitoring-driven primary.
- Approval required because impact is “High” and merges affect reporting.
Why this needs governance (not just AI)
- AI can be wrong about “same issue” vs “similar symptom.”
- Merging/closing incidents changes audit trails, SLA metrics, and postmortem evidence.
- Autom Mate acts as the execution + control layer between AI suggestions and ITSM writes, ensuring approvals, deterministic steps, and traceable logs.
Discussion questions
- Where do you draw the line: auto-link duplicates vs merge/close duplicates?
- What approval policy works best in practice: service-owner approval, Major Incident Manager approval, or rule-based for low-risk categories?