ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Anomaly Detection and Root Cause Analysis
in Distributed Application Transactions
Yuchen Zhao @
Software is Eating the World
Anomaly detection and root cause analysis in distributed application transactions
Anomaly detection and root cause analysis in distributed application transactions
it¡¯s critical to make sure
the software
is running properly
How?
Through monitoring!
Monitoring shouldn¡¯t be very hard¡­ right?
Well, it can become a bit more complex...
Or¡­ really complex...
Anomaly detection and root cause analysis in distributed application transactions
Anomaly detection and root cause analysis in distributed application transactions
Keep applications running
is hard.
Anomaly detection and root cause analysis in distributed application transactions
Challenge 1:
Enterprise applications are complex
Challenge 2:
Data is heterogeneous.
Its volume is massive and growing
Challenge 3:
Too many signals.
Finding anomalies & root causes
are non-trival.
Our solution: Relevant Fields
Machine Learning + Engineering
Q1: How to get & organize data?
Collect data in the form of
Business Transactions
Anomaly detection and root cause analysis in distributed application transactions
Q2: Can you give a real use case?
A hypothetical travel booking site with data in BT
An unexpected incident:
Anomaly detection and root cause analysis in distributed application transactions
Step 1: filtering
Step 2: find relevant fields
the relevancy score
¡°airline:AA¡± related transactions:
¡ñ 2% occurrence normally among all
travel bookings
¡ñ 82% of the current slow transactions
are from ¡°AA¡±.
¡ñ 41 times more significant than normal.
What¡¯s the root cause?
Step 3: take actions!
Q3: What¡¯s the design of the system?
Architecture Overview
Data Collection
Smart Code Instrumentation
watch every line of code, self-learning, automatic
Stream Processing & Storage
Relevant Fields Processing
all transactions
(baseline)
error/slow
transactions
(query)
Baseline & Query Sets
Q4: How to score the field?
all transactions
(baseline)
error/slow
transactions
(query)
Optimization: Dynamics Baseline
Infer baseline context from query automatically
query
transactions
transactions
of Entity 1
query
transactions
transactions
of Entity 2
transactions
of Entity n
Baseline entity is auto learned from two dimensions:
¡ñ physical (applications, tiers, nodes, etc)
¡ñ temporal
Score Normalization
Normalize the score using a function derived from
sigmoid:
Score Example
Fore more details, please check out our demo paper in ICDM 2015:
Discovering Anomalies and Root Causes in Applications via Relevant Fields Analysis,
in Proceedings of the 15th IEEE International Conference on Data Mining
Ongoing work...
Support rich data types
¡ñ time series
¡ñ text
¡ñ graphs
¡ñ ...
We¡¯re selling!
We¡¯re hiring too!
Contact Mara
or
me yuchen.zhao@appdynamics.com
Thank you!

More Related Content

What's hot (6)

PPTX
Toupload
Bond Seidel
?
PPTX
Improve the Impact of DevOps
Splunk
?
PDF
Security in a Continuous Delivery World
Dinis Cruz
?
PPTX
SplunkLive! Customer Presentation ¨C Nissan
Splunk
?
PDF
2016_Brochure_Book
Diana Damouni
?
PPTX
ThousandEyes EMEA - Salesforce Monitoring Best Practices
ThousandEyes
?
Toupload
Bond Seidel
?
Improve the Impact of DevOps
Splunk
?
Security in a Continuous Delivery World
Dinis Cruz
?
SplunkLive! Customer Presentation ¨C Nissan
Splunk
?
2016_Brochure_Book
Diana Damouni
?
ThousandEyes EMEA - Salesforce Monitoring Best Practices
ThousandEyes
?

Similar to Anomaly detection and root cause analysis in distributed application transactions (20)

PDF
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET Journal
?
PDF
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
IRJET Journal
?
PDF
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
IRJET Journal
?
PDF
A Review of deep learning techniques in detection of anomaly incredit card tr...
IRJET Journal
?
PDF
Tackling the ticking time bomb ¨C Data Migration and the hidden risks
Harley Capewell
?
PDF
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
ijcsit
?
PDF
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET Journal
?
PDF
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
AbuSyeedRaihan
?
PDF
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
IRJET Journal
?
PDF
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
IRJET Journal
?
PDF
Unsupervised Learning for Credit Card Fraud Detection
IRJET Journal
?
PDF
A Comparative Study on Credit Card Fraud Detection
IRJET Journal
?
PDF
The tops for collecting network based evidenceyou think that your.pdf
noelbuddy
?
PDF
Data Encryption Is Hard To Do Fiberlink
Product Marketing Services
?
PDF
IRJET- Survey on Credit Card Fraud Detection
IRJET Journal
?
DOCX
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
Partha_bappa
?
PPT
The Insider Threat
illustro
?
PDF
Data Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Science Council of America
?
PDF
Fraudulent Activities Detection in E-commerce Websites
IRJET Journal
?
PDF
Operationalize deep learning models for fraud detection with Azure Machine Le...
Francesca Lazzeri, PhD
?
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET Journal
?
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
IRJET Journal
?
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
IRJET Journal
?
A Review of deep learning techniques in detection of anomaly incredit card tr...
IRJET Journal
?
Tackling the ticking time bomb ¨C Data Migration and the hidden risks
Harley Capewell
?
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
ijcsit
?
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET Journal
?
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
AbuSyeedRaihan
?
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
IRJET Journal
?
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
IRJET Journal
?
Unsupervised Learning for Credit Card Fraud Detection
IRJET Journal
?
A Comparative Study on Credit Card Fraud Detection
IRJET Journal
?
The tops for collecting network based evidenceyou think that your.pdf
noelbuddy
?
Data Encryption Is Hard To Do Fiberlink
Product Marketing Services
?
IRJET- Survey on Credit Card Fraud Detection
IRJET Journal
?
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
Partha_bappa
?
The Insider Threat
illustro
?
Data Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Science Council of America
?
Fraudulent Activities Detection in E-commerce Websites
IRJET Journal
?
Operationalize deep learning models for fraud detection with Azure Machine Le...
Francesca Lazzeri, PhD
?
Ad

Recently uploaded (20)

PDF
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
?
PPTX
Computer network Computer network Computer network Computer network
Shrikant317689
?
PPTX
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
?
PPTX
Mobile database systems 20254545645.pptx
herosh1968
?
PDF
How to Buy Verified CashApp Accounts IN 2025
Buy Verified CashApp Accounts
?
PDF
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
?
PPTX
Precooling and Refrigerated storage.pptx
ThongamSunita
?
PPTX
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
?
PPTX
WHO And BIS std- for water quality .pptx
dhanashree78
?
PPT
SF 9_Unit 1.ppt software engineering ppt
AmarrKannthh
?
PDF
NFPA 10 - Estandar para extintores de incendios portatiles (ed.22 ENG).pdf
Oscar Orozco
?
PPTX
FSE_LLM4SE1_A Tool for In-depth Analysis of Code Execution Reasoning of Large...
cl144
?
PPTX
Work at Height training for workers .pptx
cecos12
?
PDF
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Mark Billinghurst
?
PPTX
CST413 KTU S7 CSE Machine Learning Introduction Parameter Estimation MLE MAP ...
resming1
?
PPTX
CST413 KTU S7 CSE Machine Learning Neural Networks and Support Vector Machine...
resming1
?
PPTX
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
rr22001247
?
PDF
13th International Conference of Security, Privacy and Trust Management (SPTM...
ijcisjournal
?
PDF
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
?
PPTX
CST413 KTU S7 CSE Machine Learning Clustering K Means Hierarchical Agglomerat...
resming1
?
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
?
Computer network Computer network Computer network Computer network
Shrikant317689
?
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
?
Mobile database systems 20254545645.pptx
herosh1968
?
How to Buy Verified CashApp Accounts IN 2025
Buy Verified CashApp Accounts
?
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
?
Precooling and Refrigerated storage.pptx
ThongamSunita
?
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
?
WHO And BIS std- for water quality .pptx
dhanashree78
?
SF 9_Unit 1.ppt software engineering ppt
AmarrKannthh
?
NFPA 10 - Estandar para extintores de incendios portatiles (ed.22 ENG).pdf
Oscar Orozco
?
FSE_LLM4SE1_A Tool for In-depth Analysis of Code Execution Reasoning of Large...
cl144
?
Work at Height training for workers .pptx
cecos12
?
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Mark Billinghurst
?
CST413 KTU S7 CSE Machine Learning Introduction Parameter Estimation MLE MAP ...
resming1
?
CST413 KTU S7 CSE Machine Learning Neural Networks and Support Vector Machine...
resming1
?
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
rr22001247
?
13th International Conference of Security, Privacy and Trust Management (SPTM...
ijcisjournal
?
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
?
CST413 KTU S7 CSE Machine Learning Clustering K Means Hierarchical Agglomerat...
resming1
?
Ad

Anomaly detection and root cause analysis in distributed application transactions