UiPath Process Mining

The UiPath Process Mining Guide

First Access

HTTP 503 error

Q: After installation the platform shows an HTTP 503 error. What does it mean?

A: Sometimes an IIS site will start reporting "HTTP Error 503. The service is unavailable.".
The problem may be fixed by restarting the Application Pool. Follow these steps.




Open IIS Manager.


Click on View Application Pools in the Actions panel to display the available application pools.


Select the Application Pool for the platform.


Click on Stop and then on Start in the Actions panel.

Error after installation

Q: After installation the platform only shows an error message. What should I do?

A: When no applications are configured, only the UiPath Process Mining Superadmin pages are available. Go to http://platform/?page=superadmin

Platform not reachable

Q: The platform is reachable from localhost, but not from other machines. What should I do?

A: A firewall might be blocking the platform. Your firewall needs to allow traffic to the platform.

By default, the platform is set to only use HTTPS. Make sure you have an HTTPS binding for the platform in IIS. Although it is strongly advised not to do, it is possible to enable HTTP. In the Superadmin Server Settings, check the AllowHTTPFor setting. You can define an IP-address range from which users can connect over HTTP.

Data Load

Large data amounts

Q: While loading large amounts of data, all sessions are killed without any feedback. What should I do

A: Possibly a maximum is set on the memory usage.
Follow these steps to fix the problem.




Open IIS Manager.


Go to Application Pools and select the Application Pool for the platform.


Right click on the Application Pool and select Recycling….


Uncheck Virtual memory usage and Private memory usage under Memory Based Maximums.

Live data

Q: Does the platform support live data?

A: UiPath Process Mining can read in data at the moment the application is opened by an end-user via live tables. Also, data can be read in when an action is triggered. However, there are several points to consider:

  • With real-time data loading, there are many dependencies which may impact the performance for the end user (opening of the dashboards, but also the calculation for dashboards) since the data is not pre-cached.
  • There will be a load on the production system each time the user opens the application.
  • End users may see different results dependent on what time they ran the report.

To avoid these issues, it is possible to take a near-time approach, which could mean an interval of once per hour. However, we see that customer primarily choose for a daily interval.

We only recommend using live data when this is absolutely necessary.

Any live data table disables the platform to use caching in this table and in any table that is dependent on this one. This will significantly impact the performance of the application.

Also, live data queries will be run on the database when an end user logs in to the application. Depending on the query and the number of end users, this might put a severe load on the database.

Incremental data loading

Q: Does the platform support incremental data loading?

A: See Data Loading: Incremental load

Data refresh interval

Q: How often does UiPath Process Mining refresh the data?

A: This depends on the business needs and how often new data becomes available in the source system. The trade-off is between the desired insights and the load on the production system.

For some use cases data is refreshed during the night, to minimize the impact on the production system and to ensure all users see the same results during the day. However, some organizations opt for a longer time frame, because they want the data to remain constant for a month to do a thorough analysis.

File size limits

Q: Is there a size limit for datasource files?

A: The maximum size of a file in a workspace is 10MB. Larger file sizes are only supported outside the scope of the workspace, and thus not committed to Git. In the Advanced -> Table Options, the Table Scope is set to Server. You can use the ServerScopePath setting in the Server Settings to specify the relative path to the datasource file.

Data archiving

Q: Does UiPath Process Mining support data archiving?

A: With our release management system, we can always roll back to previous versions. The number of older versions to retain can be configured by your organization. This may be needed if any data issues occur. However, UiPath Process Mining should not be the primary data storage, used for data archiving. For long-term retention of data you should use other systems.

Input file types

Q: What types of input files are supported?

A: The UiPath Process Mining platform supports text files such as .txt, .csv, .tsv files for which the delimiter and quotes can be selected. ASCII text files are supported in Latin-1 (ISO-8859-1) encoding, and UTF-8 files are supported with and without BOM.

The UiPath Process Mining platform also supports Excel files, both .XLSX and .XLS files can be imported. The sheet or range within the file can be specified. For sheets, an autodetect is performed for the actual data range, of the auto-detect fails the range needs to be specified in Excel and then used. Unicode within Excel is fully supported.

XES input files

Q: Does the platform support XES input files?

A: Yes, UiPath Process Mining is an officially certified XES supporting platform. If XES is required, a data script that can be used to read XES files is available.


Protect imported data

Q: How can we ensure that the imported data is protected against unauthorized manipulation?

A: The UiPath Process Mining platform is tested on security regularly (with tools like Owasp Zap, OpenVAS, etc). To increase security, we always recommend using VPN-tunnels to limit access to the platform. Risk analyses are performed regularly to ensure security is always up-to-date, we use the OWASP Testing Guide 4. Outside of the UiPath Process Mining platform, security also depends on how secure the server itself is. Security of the server itself is the responsibility of the hosting party.

Data protection

Q: When UiPath Process Mining processes the data, is the data stored in a secured storage or encrypted to protect it against unauthorized knowledge?

A: After data is processed by UiPath Process Mining, the data is stored in a proprietary file format. These files are encrypted and can only be read by UiPath Process Mining software. In the platform itself, access to certain data can be restricted on a per user basis, i.e. only let users see data they are allowed to see.



This only applies to end-users. Developers have unrestricted access to the data.

Log file protection

Q: How are the log files protected against unauthorized modification or deletion?
(Is a sufficiently large buffer provided for the log data and is it possible to configure a warning message if the storage capacity is running low / out?)

A: UiPath Process Mining offers no protection against modifying files on disk. If someone has access to the server itself, they can modify the log files on disk. Monitoring of the server is the responsibility of the hosting party.

Encryption algorithm

Q: Which specific encryption algorithm(s) and strength is leveraged to encrypt data at rest?

A: The UiPath Process Mining platform does not encrypt data out of the box. Encryption of the data disk is the responsibility of the hosting party. It is recommended to use BitLocker.

Password storage

Q: How are user passwords stored?

A: The password field is encrypted using a hash function. PBKDF2 with HMAC-SHA512 as pseudorandom function and 10000 iterations, together with a salt is used.

A salt is used to extend the input of the hash function. The salt consists of a fixed part (application specific) and a 128bit randomly generated salt which is stored in the database. The random seed is generated on initializing the application in a session.

Since a cryptographic hash function is used, an encryption key is not required. No initialization vector is used in the hash function.

User Access

Named user accounts

Q: Is it possible to combine AD users with named user accounts?

A: It is possible to add named user accounts next to using LDAP. These user accounts can also be restricted to certain IP-addresses. It is also possible to enable Two-Factor Authentication (TOTP) for these accounts.

LDAP port number

Q: Is it possible to define a different port number for LDAP?

A: By default, the platform uses the default LDAP port number. It is possible to use a different port number. You can specify the port number, for example port 123, in the URL as follows:

ldap": {
    "url":             "ldap://PROCESSGOLDTEST.pgdctest.local:123",
    "base":            "DC=pgdctest,DC=local",
    "bindDN":          "PGDCTEST\\testuser",
    "bindCredentials": "Passw0rd!",

Brute force protection

Q: Does UiPath Process Mining provide a brute force protection?

A: Yes, UiPath Process Mining limits the number of login attempts.

Database Connections

Database connection

Q: How can the database connection be set up?

A: The UiPath Process Mining platform supports database access by ODBC. ODBC is the standardized way of accessing databases on Windows and it consists of two parts:

  1. a suitable driver for the database needs to be installed. The UiPath Process Mining platform is only available in 64-bit and requires a 64-bit ODBC driver.
  2. a DSN (Data Source Name) needs to be setup that contains the information about how to access the database and provides a name the application can use to access the database. The DSN needs to be either a system DSN or created for the user that is used to run the platform.



JDBC and ODBC are different standards. Most databases have both JDBC and ODBC drives, but the UiPath Process Mining platform only supports ODBC.


Q: The ODBC DSN cannot be used from the platform. What should I do?

A Make sure you use a 64-bit ODBC driver and that the DSN is a system DSN or set up for the correct user.

Supported databases

Q: Which databases are supported?

A: All databases that can be accessed via a 64-bit ODBC driver can be used. Below is a list of commonly used databases.

  • Oracle
  • MySQL
  • MariaDB
  • PostgreSQL
  • Firebird
  • Access


Recurring loop

Q: After building my connector the process only has activities that loop with themselves. What does this mean?

A: If this is an unexpected result, you must check the Case ID’s in your input files. It is possible that the Case ID’s are not unique. In this case it is not possible to detect which is the correct Case ID and all activities with non-unique Case ID’s will occur multiple times.

Updated about a year ago


Suggested Edits are limited on API Reference Pages

You can only suggest edits to Markdown body content, but not to the API spec.