Use this file to discover all available pages before exploring further.
Back to Search AI connectors listWolken Service Desk is a cloud-based IT service management (ITSM) platform used by organisations to manage support cases, tickets, and knowledge base content. You can configure Search AI to connect to Wolken Service Desk to enable users to fetch query results using knowledge base articles and support cases from your Wolken instance.
Specification
Details
Repository type
Cloud
Supported content
Knowledge Base Articles and Cases/Tickets
Content filtering
Yes (created on, updated on, case status, business unit, and custom filters)
Search AI supports custom API-based authentication for communicating with Wolken Service Desk. Authentication requires a Host URL, Domain, Client ID, Service Account, Refresh Token, and Authorization Code associated with your Wolken instance.
Go to the Permissions tab to configure access control for the ingested content. The following options are available.
Same users as in the source system (Restricted Access) - Applies RACL-based access control. Permissions are enforced using platform/RACL configuration. Note that permissions aren’t continuously auto-synced from Wolken; any permission changes in the source system must be updated manually via RACL configuration.
Everyone (Public Access) - All users are granted full access to the ingested content, overriding any previous restrictions in the connector.
Automatic permission sync is not supported for the Wolken Service Desk connector. Attachment files are not ingested as part of the connector flow.
Go to the Content Filters tab under Connector Setup to define the scope and filters for content ingestion. Filters can be applied across both knowledge base articles and cases/tickets.
Filter Parameter
Description
Example Value
Created On (from)
Only include content created on or after this date.
2024-01-01
Created On (to)
Only include content created on or before this date.
2025-12-31
Updated On (from)
Only include content last updated on or after this date.
2024-01-01
Updated On (to)
Only include content last updated on or before this date.
2025-12-31
Case status
Filter cases by status (for example: open, closed, resolved).
Open, Closed
Business unit
Limit ingestion to content belonging to a specific business unit.
IT Support
Custom filters
Additional query-style filters can be configured to further narrow ingestion scope based on Wolken-specific fields.
After configuring the connector, go to Schedule Sync to initiate and manage content synchronization.
Use the Sync button for an immediate, on-demand sync.
Enable Schedule Sync to set up automated, recurring syncs.
The connector supports both Full Sync and Incremental Sync. During an incremental sync, only content is created or updated since the last sync is processed, reducing API load and sync time for large instances.The Schedule Sync table displays a log of all sync activity with the following details.
Field
Description
Sync Scope
The scope of the sync (for example, Full Sync).
Sync Type
Indicates whether the sync was On-Demand or Scheduled.
Once the sync is complete, go to the Content tab to review the ingested content. The tab displays the count of files that are Successful, Failed, and Skipped, along with the total number of Accessible Files.Search AI ingests two content types from Wolken Service Desk.
Search AI provides access control support for content ingested from Wolken Service Desk. The sys_racl field is used to enforce access control by associating relevant identifiers with the ingested content, ensuring that users can only access the content they’re authorised to view.
Feature
Status
RACL Support
Available (can be enabled)
RACL Sync
Not applicable (manual configuration required)
When RACL is disabled (default), all synced content is publicly accessible to all users searching the index (permission set to *).
When RACL is enabled, the connector uses RACL platform configuration to enforce access control. Since automatic permission sync isn’t supported, the Permission Entity APIs must be used to manually associate users with the appropriate permission entities after ingestion.
sys_racl can include wildcard (*) for publicly accessible content, or explicit user/group identifiers for restricted content.