Operations | Monitoring | ITSM | DevOps | Cloud

9 Key Areas to Cover in Your Anomaly Detection RFP

Evaluating a new, unknown technology is a complicated task. Although you can articulate the goals you’re trying to achieve, you’re probably faced with multiple solutions that approach the problem in different ways and highlight varying features. To cut through the clutter, you need to figure out what questions to ask in order to evaluate which technology has the optimal capabilities to get the job done in your unique setting.

Correlation Analysis: A Natural Next Step for Anomaly Detection

Over the last decade, data collection has become a commodity. Consequently, there has been a tremendous deluge of data in every area of industry. This trend is captured by recent research, which points to growing volume of raw data and growth of market segments fueled by that data growth.

The Future of Anomaly Detection

You may be using your log data in a completely wrong way. Today, your business produces more data than ever before, and log data is at the center of all this because it contains the signals of what caused a problem. If your teams have to search for these signals in an ad-hoc manner, then they are wasting their precious time. Nearly every company in existence is dealing with this challenge because it may not have the tools to filter these signals from the noise.

Alerting and anomaly detection for uptime and reliability

Being able to easily monitor the health of all your sites and services from multiple global locations is a powerful tool for site reliability. However, no one wants to sit and stare at a status dashboard all day. Naturally, teams want to be alerted when there is an issue. We can do that with alerting in Kibana. And when coupled with Elastic machine learning, alerts can be automatically generated from anomalies that are automatically detected. That’s the power of Elastic Observability.

Automated Root Cause Analysis & Anomaly Detection in Concert

Everyday IT operators are trying to prevent outages of business-critical applications. When prevention is not possible, IT operators strive to reduce the mean time to repair (MTTR) as much as possible. Improving resolution time can be quite a challenge. But IT operators don't stand alone in this challenge. They can use smart solutions that support Automated Root Cause Analysis and Anomaly Detection.

BIRCH for Anomaly Detection with InfluxDB

In this tutorial, we’ll use the BIRCH (balanced iterative reducing and clustering using hierarchies) algorithm from scikit-learn with the ADTK (Anomaly Detection Tool Kit) package to detect anomalous CPU behavior. We’ll use the InfluxDB 2.0 Python Client to query our data in InfluxDB 2.0 and return it as a Pandas DataFrame. This tutorial assumes that you have InfluxDB and Telegraf installed and configured on your local machine to gather CPU stats.

Anomaly Detection with Median Absolute Deviation

When you want to spot hosts, applications, containers, plant equipment, or sensors that are behaving differently from others, you can use the Median Absolute Deviation (MAD) algorithm to identify when a time series is “deviating from the pack”. In this tutorial, we’ll identify anomalous hosts using mad() — the Flux implementation of MAD — from a Third Party Flux Package called anaisdg/anomalydetection.

3 Reasons Why Machine Learning Anomaly Detection is Critical for eCommerce

Do you still find yourself visually monitoring dashboards for anomalies? That leaves catching revenue-related issues to chance. It’s become humanly impossible to catch incidents on streaming data. This is why many eCommerce and data-driven companies have adopted automated anomaly detection.

Self-Driving Anomaly Detection

Imagine driving on the freeway in a (partially) self-driving car like a Tesla. While you drive the car, you come across things you would expect like trees, lampposts and other cars but also things that don't belong there like trash floating around. Meanwhile, radars and sensors in the car are working hard to make sure you don't crash because of these things. If you see the freeway as your fast-changing IT environment, then all the things that don't belong there are anomalies.