More Related Content
Do You Really Need to Evolve From Monitoring to Observability?
University of Oxford: building a next generation SIEM
Four ways to combat non actionable alerts
PPT-Splunk-LegacySIEM-101_FINAL
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Data Leakage Prevention (DLP)
What's hot
From APM to Business Monitoring with AppDynamics Analytics
Combined MITRE Presentation.pdf
Data Loss Threats and Mitigations
Elastic SIEM (Endpoint Security)
What is penetration testing and career path
Security Champions - Introduce them in your Organisation
Splunk Cloud and Splunk Enterprise 7.2
Observability for modern applications
Privileged Access Management (PAM)
Software Security Metrics
Splunk Phantom SOAR Roundtable
Splunk Discovery Köln - 17-01-2020 - Accelerate Incident Response
Splunk Enterprise for InfoSec Hands-On
Similar to A Practical Guide to Anomaly Detection for DevOps
Observability – the good, the bad, and the ugly
Nicola Pagni - Anomaly Detection in Elasticsearch
Analyzing Log Data With Apache Spark
Encontro anual para apresentação das novidades da .conf23
Challenges of monitoring distributed systems
Evento anual Splunk .conf24 Highlights recap
Introduction to AWS Big Data
Observability - The good, the bad and the ugly Xp Days 2019 Kiev Ukraine
OSMC 2014: Time to say goodbye to your Nagios setup | Oliver Jan
Time to say goodbye to your Nagios based setup
Making operations visible - Nick Gallbreath
Making operations visible - devopsdays tokyo 2013
Monitoring Big Data Systems - "The Simple Way"
Using InfluxDB for Full Observability of a SaaS Platform by Aleksandr Tavgen,...
Observability - the good, the bad, and the ugly
OSMC 2014 | Time to say goodbye to your Nagios based setup? by Oliver Jan
Using Time Series for Full Observability of a SaaS Platform
The State of Log Management & Analytics for AWS
Anomaly Detection in Time-Series Data using the Elastic Stack by Henry Pak
Recently uploaded
Performance Engineering: New and Conflicting Trends
CatoCoin (CATO) – Smart Contract Security Audit Report by EtherAuthority
Orion Context Broker introduction 20260114
How Fireworks AI Achieves 1TB_s+ Throughput for Model Deployment Across Multi...
NetworkMediaWireless (1).pptxunsnsndjdjdjjdnd
C_ABAPD_2507 (83%).pdf antwoten certificate
Feasibility Analysis in System Development Using Data Flow Diagrams
Introduction to Software Development and Modern Practices
Architectural Styles in Software Engineering
Business Central and Copilot pitch deck ppt
DSD-INT 2025 iMOD Coupler - coupling Ribasim – MetaSWAP – MODFLOW 6 - Leander
Project System Presentation details process presentation
DSD-INT 2025 Large scale unsaturated zone modelling - Sequential Steady State...
our environment ppt made by many people name rarang yadav
Incident Management Roles & Responsibilities.pdf
Lect 1 Number systems and base conversions. [Autosaved].pptx
Problem Solving_20241203_220045_0000.pdf
Healthcare Mobile App Development: Features & Benefits
EMR Software for Gynaecology Clinics How EasyClinic Supports Continuity, Priv...
Cybernetic Global Intelligence Securing Businesses in a Digital-First World.pdf
A Practical Guide to Anomaly Detection for DevOps
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
Why is anomalydetection worth our time? 1 It reveals dangerous patterns that previously were undetected The static nature of rule-based and threshold-based alerts encourages a) false positives during peak times b) false negatives during quieter times 2
- 7.
Why is anomalydetection worth our time? It reveals dangerous patterns that previously were undetected 12 The static nature of rule-based and threshold-based alerts encourages a) false positives during peak times b) false negatives during quieter times
- 8.
- 9.
- 10.
Anomaly Detective byPrelert • Product: Anomaly Detective for Splunk • Pricing: $0-$225 / month (quote-based pricing > 10GB) • Setup: On premise (OS X, Windows, Linux & SunOS) • Installation: Easy (with Splunk Enterprise) • Main Datatype: Log lines
- 11.
Anomaly Detective byPrelert Highlights: • Capable of consuming any stream of machine-data • Can identify rare or unusual messages. • A robust REST API, which can process almost any data feed • Offers an out-of-the-box app for Splunk Enterprise • Extends the Splunk search language with verbs tailored for anomaly detection
- 12.
Sumo Logic •Pricing: Quote-based • Setup: SaaS (+ on-premise data collectors) • Ease of Installation: Average (deploy Sumo Logic's full solution) • Main Datatype: Log lines
- 13.
Sumo Logic Highlights: • LogReduce: a useful log crunching capability which consolidates thousands of log lines into just a few items by detecting recurring patterns. • Sumo Logic scans your historical data to evaluate a baseline of normal data rates. Then it focuses on the last few minutes and looks for rates above or below the baseline. • Anomaly detection will work even if the log lines are not exactly identical.
- 14.
Grok • Pricing:$219/month for 200 instances & custom metrics • Setup: Dedicated AWS instance • Ease of Installation: Easy • Main Datatype: System Metrics
- 15.
Grok Highlights: •Designed to monitor AWS (works with EC2, EBS, ELB, RDS). • Grok API for custom metrics (it’s fairly easy to process data from statsd). • Warns you in real time. • Customizable alerts for email or mobile notifications. • Grok uses their Android mobile app as their main UI. • Installation requires a dedicated Grok instance in your cloud environment.
- 16.
Skyline • Pricing:Open source • Setup: On-premise • Ease of Installation: Average (need python, redis and graphite) • Main Datatype: System Metrics
- 17.
Skyline Highlights: •Etsy’s minimalist web UI lists anomalies & visualizes underlying graphs. • Horizon accepts time-series data via TCP & UDP inputs. • Stream Graphite metrics into Horizon. Horizon uploads data to a redis instance where it is processed by Analyzer - a python daemon helping to find time-series which are behaving abnormally. • Oculus, the other half of the Kale stack, is a search engine for graphs. Input one graph then locate other graphs that behave like it. Detect an anomaly using Skyline, then use Oculus to search for graphs that are suspiciously correlated to the offending graph.
- 18.
- 19.
BigPanda + AnomalyDetection BigPanda uses an algorithmic, data science approach to simplify & automate incident management ! ! incident ! management ! Anomaly Detection
- 20.
Come take alook at what BigPanda is building! http://bigpanda.io Follow us online!