Process Mining
Banner background image
Process Mining
Last updated Apr 2, 2024

System Resources

Server Configuration

The server configuration highly influences the performance of Process Mining.

Key factors to be considered for the server configuration are:

  • Number of events: the total number of events of all apps that will be used simultaneously on the same server. This is important for the disk and memory size.
  • Number of end-users: the total number of end-users is important to determine the number of cores.


It is recommended to use CPUs with a high clock speed. High single-threaded performance is recommended to keep the response times of the platform to a minimum. Scale the number of cores depending on the number of concurrent users you expect to have; 1 core per 5 concurrent users is recommended.

Disk Speed

It is recommended to use SSDs with fast read speeds to reduce startup times. With faster disks, the applications will be opened faster. It is recommended to have SSD or similar speed disks installed.

Concurrent Users

Performance also depends on the number of concurrent users. When possible, memory is shared between users to improve performance. Therefore, the required memory is mostly dependent on the amount of data and not on the number of users. With the in-memory database, it is important to have sufficient memory. A minimum of 64 GB is recommended.

The actual needed resources depend on the amount of data and the number of concurrent users.

You should always check that your server configuration complies with the recommended specifications provided by UiPath Process Mining. See Hardware and Software Requirements

External Software

Virus Scanners

On some servers, virus scanners are installed. These kinds of programs can influence the performance negatively, because they scan everything that is loaded into memory. This happens when end users open an application and so adding additional loading time when opening the application. It is recommended to investigate whether virus scanners can be switched off.

Reverse Proxies

Reverse proxies may have a timeout, which may interrupt the data loading by stopping the request. It might be possible to increase the time-out period for reverse proxies.

Virtual Machines

There are two types of virtual machines. The type of virtual machine determines whether the virtual machine has direct access to the hardware.

See illustration below.

Type 1 hypervisors can run on bare metal. Type 2 hypervisors need additional OS to run, which may reduce the amount of resource at disposal of the VM which impacts the performance.


Server Diagnostics

The UiPath Process Mining platforms offers functionality to scan your server.

Follow these steps to start the Server diagnostics.




Go to the Superadmin Status tab.


Click on the menu icon in the top-left and select Run server diagnostic….

Information and benchmarks of how your platform is performing are displayed.

Please consult your UiPath Process Mining contact if you need assistance on resolving issues from the Server diagnostics.

Compare Benchmark Timings

You can run your application on another server, using the same build and dataset. Use the UiPath Profiler to gain insight into the loading times of dashboards and opening the application. By comparing the timings, you might see differences, which could be explained by the specifications of the server or software running on the server.

It should be checked if this is possible regarding the dataset. Anonymization can be used, but then make sure to use the anonymized dataset as well on the client’s server for testing.

For more advanced benchmark comparing please consult your UiPath Process Mining contact.


Separate Development and Production Server

In addition to keeping development and production separated in terms of the DTAP cycle, this may also avoid any issues of having an overloaded development server which impacts the production.

Was this page helpful?

Get The Help You Need
Learning RPA - Automation Courses
UiPath Community Forum
Uipath Logo White
Trust and Security
© 2005-2024 UiPath. All rights reserved.