Install and Configure Anomaly Detection
Anomaly Detection must be enabled after you install the Anomaly Detection Service. Enabling Anomaly Detection also enables Automated Root Cause Analysis.
Install the Anomaly Detection Services
To use Anomaly Detection, install the Anomaly Detection Services in your Kubernetes cluster.
Enable Anomaly Detection
You need to enable Anomaly Detection separately for each application.
Monitor Anomalies
To view and monitor the anomalies for application servers, business transactions, base pages, databases, and network requests, select
.Alternatively, you monitor anomalies from the following pages:
Monitor Anomalies for Business Transactions
Monitor Anomalies for Browser Applications
- From main menu, click .
- Select the desired browser application and click Details.
- Do the following:
- Click Violation & Anomalies to view all the anomalies associated with the selected browser application.
- Click Events to view all the anomaly events.
Monitor Anomalies for Databases
- From main menu, click Databases.
- Do the following:
- Click Violation & Anomalies to view all the anomalies associated with the selected database.
- Click Events to view all the anomaly events.
Monitor Anomalies for Mobile Applications
- From main menu, click .
- Select the desired mobile application and click Details.
- Do the following:
- Click Health Rule Violations to view all the anomalies associated with the selected browser application.
- Click Events to view all the anomaly events.
Configure Anomaly Detection
By default, Anomaly Detection alerts you about the anomalies found in all the business transactions, base pages, and network requests in your application. However, you can configure Anomaly Detection to surface only those anomalies within the combination of business transactions, base pages, or network requests, severity level, and detection sensitivity that you specify. Do this if you prefer to see fewer and more narrowly focused alerts: