Incident Review: How To Conduct Incident Reviews & Postmortems | Splunk (2024)

In IT and business, disruptions and outages are part of new changes, like new system rollouts or new deployments. Incident review, sometimes called an incident postmortem, is a structured process for analyzing and learning from such incidents within an organization’s system.

The incident review process documents:

  • What went wrong in a given incident.
  • Why an incident happened.
  • Strategies to ensure similar issues don't repeat in the future.

The best part of an incident review is that, when done well, you can easily improve service quality with a set of specific actions, like automating the recovery processes.

So, let’s take a look at the incident review process. In this article, you will learn what an incident review/postmortem is, the steps involved, and the best practices to maximize valuable takeaways.

What is incident review?

Organizations routinely encounter system, site, and machine failures. These disruptions in the normal service operations of any system are called “incidents”, and they can range from minor to severe incidents depending on the impact and nature.

Importantly, there's something for teams to learn from almost every incident.And that’s what the review is meant to capture: the lessons learned from a critical examination of an event or failure within a system.In general, incident review processes involve:

  1. Documenting the incident.
  2. Diagnosing its root cause.
  3. Evaluating its impact.
  4. Creating an action plan to prevent these incidents.

So we can say that the incident review process is one part of yourincident responseandincident management strategy.

Incident Review: How To Conduct Incident Reviews & Postmortems | Splunk (1)

Interestingly, postmortems have long been a part of aviation and manufacturing industries. Only more recently have these concepts gained popularity in the business and technology space, too.

Why incident postmortems are necessary

Yes, it’s true that these reviews are optional, unless of course your team or organization mandates them. Still, we think every smart organization should conduct an incident review — here’s why:

  • Allows you to do a detailed analysis of the incidents, to truly understand where the breakdown(s) occurred, in people, processes, and/or technologies.
  • Supports ongoing high-levelsystem availability.
  • Clarifies why a system behaves differently after making changesto prevent the same mistakes.

It is a great tool for learning about incident patterns in your systems.

Who performs incident review/postmortem?

Different teams, such asDevOpsandSREs, collaborate to review and analyze the incidents using real-time collaboration tools. Ideally, one person should own the postmortem report. It can be anyone from DevOps to SREs toincident managers/commanders.

(This function may even live within aCSIRT: critical security incident response team.)

Importantly, every organization or team must define its criteria for reviewing incidents and postmortems. You can automate the trigger when you want to review incidents. This way, the system will automatically be triggered when the following conditions are fulfilled:

  • A certain number of users are affected.
  • Internal or external users report an outage.
  • The organization experiences a certain amount of revenue loss during an outage.

Steps of incident review/postmortems

Every organization has a different structure of postmortem steps that works for them. In general, teams will create a postmortem reportandalso hold a meeting afterwards to communicate everything to the wider team.

Let’s look at both.

Creating a postmortem report

These are sections to understand and include in any incident review documentation.

Incident summary

The first step of postmortems is writing a summary of the incident to provide an overview of the initial problem. It includes writing about the type of incident that happened, whether it was a service problem, a bug in the code, or a site failure.

Identifying the root cause

This step involvesidentifying the incident's root causeand what triggered it. The system automatically sends alerts to the team via email or call.Different types of incident triggers include:

  • IT monitoringandapplication monitoring toolstriggering the incidentthrough an automated built-in process.
  • Users reporting incidentsor outages.
  • Team members identifyingthat something went wrong.

Often, IT or SRE team members must respond to the alerts immediately to resolve problems. A backup person must always be available in case the alert person is unavailable.

Impact on users

Not all incidents are the same. The severity varies and can impact one user or the entire site. It happens when a service is down for all users or when data is compromised.

While a minor incident results in a minor inconvenience, with anincident response planready, you analyze how an incident impacted users.

(Related reading:Understand how incident severity levels work.)

(See how Splunk solutions support the entire incident management practice.)

Document detection and resolution

In this step, you document how the incident was detected. Did internal teams report it, or did an external user complain?

Here, team members document the delay from the initial report, which can range from minutes to hours. The longer the delay in reporting, the higher the loss.You also document how the incident was resolved and the duration and timeline of actions taken.

In some cases, detecting the problem takes longer than resolving it. The goal should be to minimize the duration of incident detection and resolution.

(Related reading: MTTA (mean time to acknowledge & other incident response metrics to know.)

Acknowledge what went well & what went wrong

Here, you simply want to acknowledge the good outcomes and the things that could have been better. (As we’ll see later, this is not the time for blame.) You also record any positive aspects or successful responses during the incident. This section of the report identifies:

  • Areas where the response or system fell short.
  • Any fortunate circ*mstances that helped mitigate the impact.

Map an action plan for the future

The crux of postmortem action is to learn from an incident postmortem report and map an action plan. Here, team members outline specific steps to prevent similar incidents in the future, including:

  • Mitigation
  • Prevention
  • Process improvements

Lessons learning/postmortem meeting

Why and when should you hold postmortem meetings? This is the most common question. You can arrange these meetings in two scenarios, either:

  • Only when something goes wrong.
  • At the end of every project.

These meetings discuss what worked well and what went wrong and commit to learning from the mistakes moving forward.All team members in the project should attend the meeting so everyone can focus on constructive feedback — systems and processes that failed, instead of blaming specific people.

Incident review/postmortems: Best practices

Following are the best practices for conducting incident postmortems:

Don't blame humans

The main goal should be to fix systems and processes, not blame individuals. Rather than focusing on who made the change, find why your system was vulnerable to something.

Blameless incident postmortems make the system resilient and reliable. And just as a person shouldn't be blamed, the entire credit for success shouldn't be given to one person — after all, a system's success and failure don't rely on a single person.

Improve your action plan

Identify areas for improvement and update your existing incident postmortem plan to prevent similar incidents in the future, or be prepared to respond if they do occur.

Here’s what you can do to improve the existing action plan during a postmortem:

  1. Identify gaps and weaknesses in the existing action plan.
  2. Gather diverse perspectives from stakeholders to uncover blind spots.
  3. Prioritize improvements based on impact, likelihood, and resources.
  4. Define specific, actionable steps with assigned owners and deadlines.
  5. Address systemic issues by revising policies, training, or implementing new tools.
  6. Regularly review and update your plan accordingly.
  7. Effectively communicate and provide training on the updated action plan.
  8. Establish a mechanism for tracking implementation and ensuring accountability.

(Related reading: incident response plans & disaster recovery plans.)

Think beyond prevention

Prevention shouldn't be your only focus. Automation is invaluable for early detection. It limits the number of incidents and mitigates them, regardless of severity.Here's how automation helps:

  • Detect incidents earlier.
  • Analyze and validate incidents seamlessly.
  • Speed up the recovery.

(Related reading: security automation & RPA: robotic process automation.)

Increase team morale

You should take mistakes as learning opportunities to enhance system resilience and reliability. Doing so will increase team morale and build a high-performing team. Maintaining a friendly culture will help your teams collaborate and communicate openly, leading to efficient and smooth operations.

Learn from incident postmortems

That’s right: 6.41 million data was breached worldwide in 2023. The best organizations can do is identify any issues before an incident occurs to prevent any breaches. But that's one part of the story. Learn from the previous incidents to avoid them in the future. You can do that by preparing incident review or lessons learned reports.

Incident Review: How To Conduct Incident Reviews & Postmortems | Splunk (2024)
Top Articles
Latest Posts
Article information

Author: Jonah Leffler

Last Updated:

Views: 5748

Rating: 4.4 / 5 (45 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Jonah Leffler

Birthday: 1997-10-27

Address: 8987 Kieth Ports, Luettgenland, CT 54657-9808

Phone: +2611128251586

Job: Mining Supervisor

Hobby: Worldbuilding, Electronics, Amateur radio, Skiing, Cycling, Jogging, Taxidermy

Introduction: My name is Jonah Leffler, I am a determined, faithful, outstanding, inexpensive, cheerful, determined, smiling person who loves writing and wants to share my knowledge and understanding with you.