Operations | Monitoring | ITSM | DevOps | Cloud

Anomaly Detection

The Future of Anomaly Detection

You may be using your log data in a completely wrong way. Today, your business produces more data than ever before, and log data is at the center of all this because it contains the signals of what caused a problem. If your teams have to search for these signals in an ad-hoc manner, then they are wasting their precious time. Nearly every company in existence is dealing with this challenge because it may not have the tools to filter these signals from the noise.

Alerting and anomaly detection for uptime and reliability

Being able to easily monitor the health of all your sites and services from multiple global locations is a powerful tool for site reliability. However, no one wants to sit and stare at a status dashboard all day. Naturally, teams want to be alerted when there is an issue. We can do that with alerting in Kibana. And when coupled with Elastic machine learning, alerts can be automatically generated from anomalies that are automatically detected. That’s the power of Elastic Observability.

Automated Root Cause Analysis & Anomaly Detection in Concert

Everyday IT operators are trying to prevent outages of business-critical applications. When prevention is not possible, IT operators strive to reduce the mean time to repair (MTTR) as much as possible. Improving resolution time can be quite a challenge. But IT operators don't stand alone in this challenge. They can use smart solutions that support Automated Root Cause Analysis and Anomaly Detection.

BIRCH for Anomaly Detection with InfluxDB

In this tutorial, we’ll use the BIRCH (balanced iterative reducing and clustering using hierarchies) algorithm from scikit-learn with the ADTK (Anomaly Detection Tool Kit) package to detect anomalous CPU behavior. We’ll use the InfluxDB 2.0 Python Client to query our data in InfluxDB 2.0 and return it as a Pandas DataFrame. This tutorial assumes that you have InfluxDB and Telegraf installed and configured on your local machine to gather CPU stats.

Anomaly Detection with Median Absolute Deviation

When you want to spot hosts, applications, containers, plant equipment, or sensors that are behaving differently from others, you can use the Median Absolute Deviation (MAD) algorithm to identify when a time series is “deviating from the pack”. In this tutorial, we’ll identify anomalous hosts using mad() — the Flux implementation of MAD — from a Third Party Flux Package called anaisdg/anomalydetection.

3 Reasons Why Machine Learning Anomaly Detection is Critical for eCommerce

Do you still find yourself visually monitoring dashboards for anomalies? That leaves catching revenue-related issues to chance. It’s become humanly impossible to catch incidents on streaming data. This is why many eCommerce and data-driven companies have adopted automated anomaly detection.

Self-Driving Anomaly Detection

Imagine driving on the freeway in a (partially) self-driving car like a Tesla. While you drive the car, you come across things you would expect like trees, lampposts and other cars but also things that don't belong there like trash floating around. Meanwhile, radars and sensors in the car are working hard to make sure you don't crash because of these things. If you see the freeway as your fast-changing IT environment, then all the things that don't belong there are anomalies.

The Top 10 Anomalies of the Last Decade

As a company known for our anomaly detection, we know a thing or two about spotting irregularities. So as we reached the end of 2019, we couldn’t help but think back on the 2010s and the anomalies that shook the world. Once we got to listing them, it really became tough to pick just 10. Ultimately, after much debate, we ranked them based on their impact, newsworthiness and how utterly unexpected they were.

Three types of data for anomaly detection

As Chief Data Scientist here at StackState I’ve got a big interest in less likely to happen occurrences in data. These events are called anomalies. Every company with a considerable IT environment should be able to detect, solve and also prevent anomalies. Because anomalies can have a big effect on your day to day business.