Skip to content

Commit 464ed0c

Browse files
committed
Metrics anomaly detection fix
1 parent a2af90d commit 464ed0c

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

docs/alerts/monitors/create-monitor.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -81,11 +81,11 @@ Next, select a **Detection Method** (not applicable to SLO monitors).
8181

8282
<img src={useBaseUrl('img/alerts/monitors/monitor-detection-methods-for-logs.png')} alt="Logs detection methods" width="200"/>
8383

84-
**Static**
84+
#### Static
8585

8686
Set specific threshold conditions for well-defined KPIs with constant thresholds (for example, infrastructure metrics like CPU utilization and memory).
8787

88-
**Anomaly**
88+
#### Anomaly
8989

9090
Leverage machine learning to identify unusual behavior and suspicious patterns by establishing baselines for normal activity. This [*AI-driven alerting*](https://www.youtube.com/watch?v=nMRoYb1YCfg) system uses historical data to minimize false positives and alerts you to deviations.
9191

@@ -249,7 +249,7 @@ Log monitor triggers are evaluated by balancing the requirement of timely alert
249249
To fully leverage AI-driven alerts for metrics monitors, you'll need:
250250

251251
* **Automation Service**. Required for linking playbooks to metrics-based monitors.
252-
* **Metrics data**. Our anomaly detection uses at least 30 days of your Sumo Logic metrics data history to establish baseline of the metrics signal and the underlying system behavior.
252+
* **Metrics data**. Our anomaly detection uses up to 30 days of your Sumo Logic metrics data history to establish baseline of the metrics signal and the underlying system behavior.
253253
* **Metrics aggregation**. Queries should be aggregated (for example, using `sum` or `avg` operators) before applying anomaly detection.
254254

255255
Examples:
@@ -311,6 +311,10 @@ For example, you want to be alerted when the CPU usage is over 60% `at all times
311311
This setting only works when you choose `at all times within` as the type of occurrence for the alert.
312312
:::
313313

314+
<!-- awaiting instructions from B.A.
315+
#### Anomaly detection method
316+
--->
317+
314318
#### Outlier detection method
315319

316320
**Example: Metrics Trigger Type - Critical and Warning**

0 commit comments

Comments
 (0)