This page is part of the FHIR Specification (v3.5.0: R4 Ballot #2). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions . Page versions: R5 R4B R4 R3 R2
FHIR Infrastructure Work Group | Maturity Level: 5 | Normative | Use Context: Any |
Normative Candidate Note: This page is candidate normative content for R4 in the Infrastructure Package. Once normative, it will lose it's Maturity Level, and breaking changes will no longer be made.
This is a value set defined by the FHIR project.
Summary
Defining URL: | http://hl7.org/fhir/ValueSet/issue-type |
Version: | 3.5.0 |
Name: | IssueType |
Title: | IssueType |
Definition: | A code that describes the type of issue. |
Committee: | FHIR Infrastructure Work Group |
OID: | 2.16.840.1.113883.4.642.3.410 (for OID based terminology systems) |
Source Resource | XML / JSON |
This value set is used in the following places:
This value set includes codes from the following code systems:
http://hl7.org/fhir/issue-type
This expansion generated 19 Aug 2018
This value set contains 31 concepts
Expansion based on http://hl7.org/fhir/issue-type version 3.5.0
All codes from system http://hl7.org/fhir/issue-type
Lvl | Code | Display | Definition |
0 | invalid | Invalid Content | Content invalid against the specification or a profile. |
1 | structure | Structural Issue | A structural issue in the content such as wrong namespace, or unable to parse the content completely, or invalid json syntax. |
1 | required | Required element missing | A required element is missing. |
1 | value | Element value invalid | An element or header value is invalid. |
1 | invariant | Validation rule failed | A content validation rule failed - e.g. a schematron rule. |
0 | security | Security Problem | An authentication/authorization/permissions issue of some kind. |
1 | login | Login Required | The client needs to initiate an authentication process. |
1 | unknown | Unknown User | The user or system was not able to be authenticated (either there is no process, or the proferred token is unacceptable). |
1 | expired | Session Expired | User session expired; a login may be required. |
1 | forbidden | Forbidden | The user does not have the rights to perform this action. |
1 | suppressed | Information Suppressed | Some information was not or might not have been returned due to business rules, consent or privacy rules, or access permission constraints. This information may be accessible through alternate processes. |
0 | processing | Processing Failure | Processing issues. These are expected to be final e.g. there is no point resubmitting the same content unchanged. |
1 | not-supported | Content not supported | The interaction, operation, resource or profile is not supported. |
1 | duplicate | Duplicate | An attempt was made to create a duplicate record. |
1 | multiple-matches | Multiple Matches | Multiple matching records were found when the operation required only one match. |
1 | not-found | Not Found | The reference provided was not found. In a pure RESTful environment, this would be an HTTP 404 error, but this code may be used where the content is not found further into the application architecture. |
2 | deleted | Deleted | The reference pointed to content (usually a resource) that has been deleted. |
1 | too-long | Content Too Long | Provided content is too long (typically, this is a denial of service protection type of error). |
1 | code-invalid | Invalid Code | The code or system could not be understood, or it was not valid in the context of a particular ValueSet.code. |
1 | extension | Unacceptable Extension | An extension was found that was not acceptable, could not be resolved, or a modifierExtension was not recognized. |
1 | too-costly | Operation Too Costly | The operation was stopped to protect server resources; e.g. a request for a value set expansion on all of SNOMED CT. |
1 | business-rule | Business Rule Violation | The content/operation failed to pass some business rule and so could not proceed. |
1 | conflict | Edit Version Conflict | Content could not be accepted because of an edit conflict (i.e. version aware updates). (In a pure RESTful environment, this would be an HTTP 409 error, but this code may be used where the conflict is discovered further into the application architecture.). |
0 | transient | Transient Issue | Transient processing issues. The system receiving the error may be able to resubmit the same content once an underlying issue is resolved. |
1 | lock-error | Lock Error | A resource/record locking failure (usually in an underlying database). |
1 | no-store | No Store Available | The persistent store is unavailable; e.g. the database is down for maintenance or similar action, and the interaction or operation cannot be processed. |
1 | exception | Exception | y. |
1 | timeout | Timeout | An internal timeout has occurred. |
1 | incomplete | Incomplete Results | Not all data sources typically accessed could be reached or responded in time, so the returned information might not be complete (applies to search interactions and some operations). |
1 | throttled | Throttled | The system is not prepared to handle this request due to load management. |
0 | informational | Informational Note | A message unrelated to the processing success of the completed operation (examples of the latter include things like reminders of password expiry, system maintenance times, etc.). |
See the full registry of value sets defined as part of FHIR.
Explanation of the columns that may appear on this page:
Lvl | A few code lists that FHIR defines are hierarchical - each code is assigned a level. For value sets, levels are mostly used to organize codes for user convenience, but may follow code system hierarchy - see Code System for further information |
Source | The source of the definition of the code (when the value set draws in codes defined elsewhere) |
Code | The code (used as the code in the resource instance). If the code is in italics, this indicates that the code is not selectable ('Abstract') |
Display | The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application |
Definition | An explanation of the meaning of the concept |
Comments | Additional notes about how to use the code |