We're Hiring! We're Hiring!

MTTR vs. MTTR vs. MTTR: A Complete Set of Common Incident Management Metrics

When it comes to incident management metrics, there are a common set of key performance indicators (KPIs) in IT operations management (ITOM)

These metrics are crucial to understanding, diagnosing, and fixing the issues that prevent your IT infrastructure from operating at peak efficiency.

These metrics include:

  • Mean Time to Detection (MTTD) the average time it takes for an issue to be identified as one requiring attention
  • Mean Time to Acknowledge (MTTA) the average time it takes for an alert to result in the initiation of action, usually the issuing of a service ticket, on the part of the IT operations team
  • Mean Time to Respond (MTTR) the average time it takes to begin the work associated with a service ticket
  • Mean Time to Repair (MTTR) the average time it takes from the point of detection until the system is fixed
  • Mean Time to Resolve (MTTR) the average time it takes from the point of detection until the system is fixed and tested to ensure the associated system is working properly
  • Mean Time to Recovery (MTTR) the average time it takes from the point of detection to when the associated system is fully operational

There are two other Mean Time KPIs that are used to determine how effective you are at operating and supporting your digital services. And while you want your MTTx numbers to be small, you want your MTB numbers to be large.

  • Mean Time Between Failure (MTBF) the average time between incidents of a particular device or application
  • Mean Time Between System Incidents (MTBSI) the average time between failures of a system or service rather than the failure of any single component of the system or service

Unfortunately, over time some of these metrics have been overlooked, neglected, and even ignored. This can result in inconsistent and deceptive performance measurements that are reflected in the substandard health, availability, and reliability of the services and applications you rely on to achieve your mission objectives. But it doesn’t have to be this way.

Overwhelmed by Complexity

Brian Amaro Sr. Director Global Solutions, ScienceLogic

In an ironic twist, the above situation came about due to the evolution of the enterprises they were meant to help. As IT estates grew in size and complexity, it became more difficult to keep up with the volume of events – and more recently, anomalies – generated. To deal with the growth of issues, tools multiplied, and staffs grew. But eventually, an enterprise reaches a point of diminishing returns or runs up against budget constraints.

That’s when your ITOM staff starts looking for other ways to adapt. They do the best they can to prioritize and fix the biggest issues as quickly as they can, and they develop workarounds for the rest. That includes the convenient omission of some of those pesky MTTx KPIs.

But there’s a reason those KPIs exist. There’s a measured process for addressing incidents, and how you measure the speed and efficacy of your incident management process matters. If you don’t measure each step consistently every time, you can’t determine whether you’ve actually fixed the problem or if you’ve merely suppressed the symptom. That’s why there is a complete set of common incident management metrics, and why they are in their order: detect, acknowledge, respond, repair, resolve, and recover.

Incident Metrics Step-by-Step

When an incident is identified, it triggers an alert. That’s when the clock should start ticking. In my experience, 90% of companies don’t start measuring for any MTTx results until a ticket is created. When you skip steps in the process, however, you manipulate the results of Mean Time to Resolve, and when that happens, and the incident goes away, or the supporting data necessary for performing triage and diagnosis is not captured, potential problems are dismissed as “noise” in the system.

For example, if an event occurs and is identified at 12:00pm (Mean Time to Detect), but the incident isn’t opened (Mean Time to Acknowledge) until 1:00pm and that is when you begin your measurement, you’ve not only artificially cut an hour from your Mean Time to Repair calculation, but you’ve also lost the data associated with the event that could have provided key insights for triage and, ultimately, a diagnosis that allows you to repair the device or application, and to find and fix the underlying problem. You came away from the incident with a good Mean Time to Resolve, but you have also doomed yourself to a recurring issue and, notably, poor metrics for Mean Time Between Failures and also Mean Time Between System Incidents (if you’re even keeping track of those).

Don’t Take Shortcuts

These measurements were created because they are essential to determining the state of a repair. When you follow the proper process and don’t rely on shortcuts or workarounds, you end up with a better result in the long run. Because some repairs require specific processes—such as a full system restart—to complete, skipping or ignoring steps might even result in missing a simple fix that prevents a complete recovery. When you see the same incidents over and over again, you may have a Mean Time to Repair of 30 minutes, but no Mean Time to Recovery because the machine or application is still in an error state.

These time-wasting exercises bedevil organizations that fail to track and record all of the MTTx KPIs. If you aren’t tracking MTBF, (and few organizations do) and rely on workarounds and shortcuts to resolve incidents, you will fail to recognize weaknesses in the system or capture the data necessary to fix the problem. Over time, and despite the likelihood of serious system failures and even SLA violations, it will be difficult to isolate the reasons why, because your Mean Time to Repair figures seem strong.

Why does that happen? Workarounds are the bane of IT operations. They hide evidence of poor performance, while providing just enough plausible deniability of an actual problem to allow things to continue uncorrected. Every enterprise uses them to some degree, most often by necessity. You do what you can with what you have to keep the operation running, after all. Fortunately, there is a better way.

Machine Speed and AIOps

When configured correctly, a machine will respond to signals that fall outside of acceptable thresholds—or act ‘weird’ when evaluated against normal patterns of behavior. It doesn’t get fatigued or frustrated by the same incident recurring, no matter how quickly after a resolution, or how often. A machine has its instructions and tells you when something is not normal. It has no emotional stake in that decision and has no concern about its next performance review. But the more these problems affect human beings, the more likely those concerns are to affect the process, and operational processes not built on these metrics are doomed to fail. But so are ITOM teams that are expected to follow a process that hews to these metrics, but without the tools capable of operating with the speed and accuracy required by today’s modern IT estates.

That is where AIOps comes to play. We can revive the full set of KPIs and achieve better ITOM results when we rely on machines with the speed and intelligence to keep pace with the volume, variety, and velocity of incidents. An AIOps platform, like ScienceLogic SL1, is purpose-built for the task of monitoring the totality of today’s complex IT estates and capturing all the relevant data necessary to understand the health, availability, and reliability of all systems and services. You can measure all your KPIs and use them as a measurement to keep your services, infrastructure, and applications running at their best. What’s more, with an AIOps platform like SL1, you can build toward using the inherent intelligence and speed of the platform to build toward the automation of incident response. All those nagging signals that you’ve been treating as noise in the system can be addressed quickly and completely, and you can use the associated data to better understand the big picture of your system’s efficient operations.

Is your organization among those struggling to keep up with the volume, variety, and velocity of incidents and their associated data? Is your organization still using legacy tools and brute force to monitor and manage an increasingly complex IT estate? If so, it’s time to modernize and move up to an AIOps platform.

To learn more about what ScienceLogic and AIOps can do for you, read the Forrester Wave: Artificial Intelligence for IT Operations»

 


 

X