Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":2536,"date":"2024-02-23T00:50:56","date_gmt":"2024-02-23T00:50:56","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/"},"modified":"2024-02-23T00:50:56","modified_gmt":"2024-02-23T00:50:56","slug":"identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/","title":{"rendered":"Identify Weak Links in Your Application Stack \u2013 Part 2, Anomaly Detection Prathima Janakiram on February 22, 2024 at 7:39 pm"},"content":{"rendered":"

Anomaly Detection and Cisco Cloud Observability APIs<\/h2>\n

In the Part 1 blog<\/a> [1], we talked about the importance of application observability and how the application stack is more complex than ever with\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b[[{“value”:”<\/p>\n

Anomaly Detection and Cisco Cloud Observability APIs<\/h2>\n

In the Part 1 blog<\/a> [1], we talked about the importance of application observability and how the application stack is more complex than ever with multi cloud deployments. We saw how the FSO solution, Cisco Cloud Observability [2], can be used to identify and react to cloud native application entity health leveraging Health Rules APIs and Actions API.<\/p>\n

One aspect of any APM solution is to ensure that your business applications are healthy. Another key aspect is to ensure that they are performing per the metrics that you lay out. Applications should be performing at or above their expected behavior. How does one specify this expected behavior? Can we leverage machine learning capabilities of the Full-Stack Observability solution to learn what\u2019s normal, and flag when abnormal behavior of an application is detected? This is where anomaly detection [3] comes in. This blog gets you started with how to go about configuring anomaly detection and associate actions when violations are detected.<\/p>\n

As in health rules, cloud connections to your cloud accounts starts the data collection from your cloud resources and services. This data forms the basis for the machine learning algorithm to identify abnormal behavior.<\/p>\n

Cloud Connections with Cisco Cloud Observability<\/h2>\n

Review cloud connection API\u2019s in the blogs referenced in [4] [5].<\/p>\n

Fig 1. H<\/em>igh-level overview of how\u00a0Cloud Native Application Observability work<\/em><\/p>\n

Monitoring Entity Health with Cloud Native Application Observability<\/h2>\n

For manual provisioning of anomaly detection and actions with ClickOps, you would use the Cisco Cloud Observability portal.[6]<\/p>\n

For programmatic provisioning of health rules and actions using API\u2019s [7], you can explore this with:<\/p>\n

sample python code [8],
\nsandbox [9] and
\nlearning lab [10].<\/p>\n

As an example, the code and sandbox use the lowest entity in you application stack, namely compute. The same methodology can be used on any supported entity in the application stack for which data collection is enabled. You can review the entities enabled for AD in [3].<\/p>\n

Further reading<\/h2>\n

[1] Identify weak links in your application stack with FSO Health Rules<\/a>
\n[2]
About Cisco Cloud Observability<\/a>
\n[3]
Anomaly Detection in Cisco Cloud Observability<\/a>
\n[4]
Leverage Abstraction To Hide Complexity with Cisco Cloud Observability Cloud Connection API<\/a>
\n[5]
Automating Observability with Cisco Cloud Observability Cloud API\u2019s<\/a>
\n[6]
Anomaly Detection Configuration with ClickOps<\/a>
\n[7]
API Documentation<\/a>
\n[8]
DevNet Code Exchange<\/a>
\n[9]
Sandbox<\/a>
\n[10]
Learning Lab<\/a><\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0How can you learn what\u2019s normal, and flag when abnormal behavior of an application is detected? This blog gets you started with how to configure anomaly detection and associate actions when violations are detected.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

Anomaly Detection and Cisco Cloud Observability APIs<\/h2>\n

In the Part 1 blog<\/a> [1], we talked about the importance of application observability and how the application stack is more complex than ever with\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b[[{“value”:”<\/p>\n

Anomaly Detection and Cisco Cloud Observability APIs<\/h2>\n

In the Part 1 blog<\/a> [1], we talked about the importance of application observability and how the application stack is more complex than ever with multi cloud deployments. We saw how the FSO solution, Cisco Cloud Observability [2], can be used to identify and react to cloud native application entity health leveraging Health Rules APIs and Actions API.<\/p>\n

One aspect of any APM solution is to ensure that your business applications are healthy. Another key aspect is to ensure that they are performing per the metrics that you lay out. Applications should be performing at or above their expected behavior. How does one specify this expected behavior? Can we leverage machine learning capabilities of the Full-Stack Observability solution to learn what\u2019s normal, and flag when abnormal behavior of an application is detected? This is where anomaly detection [3] comes in. This blog gets you started with how to go about configuring anomaly detection and associate actions when violations are detected.<\/p>\n

As in health rules, cloud connections to your cloud accounts starts the data collection from your cloud resources and services. This data forms the basis for the machine learning algorithm to identify abnormal behavior.<\/p>\n

Cloud Connections with Cisco Cloud Observability<\/h2>\n

Review cloud connection API\u2019s in the blogs referenced in [4] [5].<\/p>\n

Fig 1. H<\/em>igh-level overview of how\u00a0Cloud Native Application Observability work<\/em><\/p>\n

Monitoring Entity Health with Cloud Native Application Observability<\/h2>\n

For manual provisioning of anomaly detection and actions with ClickOps, you would use the Cisco Cloud Observability portal.[6]<\/p>\n

For programmatic provisioning of health rules and actions using API\u2019s [7], you can explore this with:<\/p>\n

sample python code [8],
\nsandbox [9] and
\nlearning lab [10].<\/p>\n

As an example, the code and sandbox use the lowest entity in you application stack, namely compute. The same methodology can be used on any supported entity in the application stack for which data collection is enabled. You can review the entities enabled for AD in [3].<\/p>\n

Further reading<\/h2>\n

[1] Identify weak links in your application stack with FSO Health Rules<\/a>
\n[2]
About Cisco Cloud Observability<\/a>
\n[3]
Anomaly Detection in Cisco Cloud Observability<\/a>
\n[4]
Leverage Abstraction To Hide Complexity with Cisco Cloud Observability Cloud Connection API<\/a>
\n[5]
Automating Observability with Cisco Cloud Observability Cloud API\u2019s<\/a>
\n[6]
Anomaly Detection Configuration with ClickOps<\/a>
\n[7]
API Documentation<\/a>
\n[8]
DevNet Code Exchange<\/a>
\n[9]
Sandbox<\/a>
\n[10]
Learning Lab<\/a><\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0How can you learn what\u2019s normal, and flag when abnormal behavior of an application is detected? This blog gets you started with how to configure anomaly detection and associate actions when violations are detected.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":2537,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2536","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nIdentify Weak Links in Your Application Stack \u2013 Part 2, Anomaly Detection Prathima Janakiram on February 22, 2024 at 7:39 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identify Weak Links in Your Application Stack \u2013 Part 2, Anomaly Detection Prathima Janakiram on February 22, 2024 at 7:39 pm\" \/>\n<meta property=\"og:description\" content=\"Anomaly Detection and Cisco Cloud Observability APIs In the Part 1 blog [1], we talked about the importance of application observability and how the application stack is more complex than ever with\u2026 Read more on Cisco Blogs \u200b[[{"value":" Anomaly Detection and Cisco Cloud Observability APIs In the Part 1 blog [1], we talked about the importance of application observability and how the application stack is more complex than ever with multi cloud deployments. We saw how the FSO solution, Cisco Cloud Observability [2], can be used to identify and react to cloud native application entity health leveraging Health Rules APIs and Actions API. One aspect of any APM solution is to ensure that your business applications are healthy. Another key aspect is to ensure that they are performing per the metrics that you lay out. Applications should be performing at or above their expected behavior. How does one specify this expected behavior? Can we leverage machine learning capabilities of the Full-Stack Observability solution to learn what\u2019s normal, and flag when abnormal behavior of an application is detected? This is where anomaly detection [3] comes in. This blog gets you started with how to go about configuring anomaly detection and associate actions when violations are detected. As in health rules, cloud connections to your cloud accounts starts the data collection from your cloud resources and services. This data forms the basis for the machine learning algorithm to identify abnormal behavior. Cloud Connections with Cisco Cloud Observability Review cloud connection API\u2019s in the blogs referenced in [4] [5]. Fig 1. High-level overview of how\u00a0Cloud Native Application Observability work Monitoring Entity Health with Cloud Native Application Observability For manual provisioning of anomaly detection and actions with ClickOps, you would use the Cisco Cloud Observability portal.[6] For programmatic provisioning of health rules and actions using API\u2019s [7], you can explore this with: sample python code [8], sandbox [9] and learning lab [10]. As an example, the code and sandbox use the lowest entity in you application stack, namely compute. The same methodology can be used on any supported entity in the application stack for which data collection is enabled. You can review the entities enabled for AD in [3]. Further reading [1] Identify weak links in your application stack with FSO Health Rules [2] About Cisco Cloud Observability [3] Anomaly Detection in Cisco Cloud Observability [4] Leverage Abstraction To Hide Complexity with Cisco Cloud Observability Cloud Connection API [5] Automating Observability with Cisco Cloud Observability Cloud API\u2019s [6] Anomaly Detection Configuration with ClickOps [7] API Documentation [8] DevNet Code Exchange [9] Sandbox [10] Learning Lab Share Share: "}]]\u00a0\u00a0How can you learn what\u2019s normal, and flag when abnormal behavior of an application is detected? This blog gets you started with how to configure anomaly detection and associate actions when violations are detected.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-23T00:50:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589018-5F64PF.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Identify Weak Links in Your Application Stack \u2013 Part 2, Anomaly Detection Prathima Janakiram on February 22, 2024 at 7:39 pm\",\"datePublished\":\"2024-02-23T00:50:56+00:00\",\"dateModified\":\"2024-02-23T00:50:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/\"},\"wordCount\":470,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589018-5F64PF.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/\",\"name\":\"Identify Weak Links in Your Application Stack \u2013 Part 2, Anomaly Detection Prathima Janakiram on February 22, 2024 at 7:39 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589018-5F64PF.gif\",\"datePublished\":\"2024-02-23T00:50:56+00:00\",\"dateModified\":\"2024-02-23T00:50:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589018-5F64PF.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589018-5F64PF.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identify Weak Links in Your Application Stack \u2013 Part 2, Anomaly Detection Prathima Janakiram on February 22, 2024 at 7:39 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Identify Weak Links in Your Application Stack \u2013 Part 2, Anomaly Detection Prathima Janakiram on February 22, 2024 at 7:39 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/","og_locale":"en_US","og_type":"article","og_title":"Identify Weak Links in Your Application Stack \u2013 Part 2, Anomaly Detection Prathima Janakiram on February 22, 2024 at 7:39 pm","og_description":"Anomaly Detection and Cisco Cloud Observability APIs In the Part 1 blog [1], we talked about the importance of application observability and how the application stack is more complex than ever with\u2026 Read more on Cisco Blogs \u200b[[{\"value\":\" Anomaly Detection and Cisco Cloud Observability APIs In the Part 1 blog [1], we talked about the importance of application observability and how the application stack is more complex than ever with multi cloud deployments. We saw how the FSO solution, Cisco Cloud Observability [2], can be used to identify and react to cloud native application entity health leveraging Health Rules APIs and Actions API. One aspect of any APM solution is to ensure that your business applications are healthy. Another key aspect is to ensure that they are performing per the metrics that you lay out. Applications should be performing at or above their expected behavior. How does one specify this expected behavior? Can we leverage machine learning capabilities of the Full-Stack Observability solution to learn what\u2019s normal, and flag when abnormal behavior of an application is detected? This is where anomaly detection [3] comes in. This blog gets you started with how to go about configuring anomaly detection and associate actions when violations are detected. As in health rules, cloud connections to your cloud accounts starts the data collection from your cloud resources and services. This data forms the basis for the machine learning algorithm to identify abnormal behavior. Cloud Connections with Cisco Cloud Observability Review cloud connection API\u2019s in the blogs referenced in [4] [5]. Fig 1. High-level overview of how\u00a0Cloud Native Application Observability work Monitoring Entity Health with Cloud Native Application Observability For manual provisioning of anomaly detection and actions with ClickOps, you would use the Cisco Cloud Observability portal.[6] For programmatic provisioning of health rules and actions using API\u2019s [7], you can explore this with: sample python code [8], sandbox [9] and learning lab [10]. As an example, the code and sandbox use the lowest entity in you application stack, namely compute. The same methodology can be used on any supported entity in the application stack for which data collection is enabled. You can review the entities enabled for AD in [3]. Further reading [1] Identify weak links in your application stack with FSO Health Rules [2] About Cisco Cloud Observability [3] Anomaly Detection in Cisco Cloud Observability [4] Leverage Abstraction To Hide Complexity with Cisco Cloud Observability Cloud Connection API [5] Automating Observability with Cisco Cloud Observability Cloud API\u2019s [6] Anomaly Detection Configuration with ClickOps [7] API Documentation [8] DevNet Code Exchange [9] Sandbox [10] Learning Lab Share Share: \"}]]\u00a0\u00a0How can you learn what\u2019s normal, and flag when abnormal behavior of an application is detected? This blog gets you started with how to configure anomaly detection and associate actions when violations are detected.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/","og_site_name":"JHC","article_published_time":"2024-02-23T00:50:56+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589018-5F64PF.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/"},"author":{"name":"","@id":""},"headline":"Identify Weak Links in Your Application Stack \u2013 Part 2, Anomaly Detection Prathima Janakiram on February 22, 2024 at 7:39 pm","datePublished":"2024-02-23T00:50:56+00:00","dateModified":"2024-02-23T00:50:56+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/"},"wordCount":470,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589018-5F64PF.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/","url":"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/","name":"Identify Weak Links in Your Application Stack \u2013 Part 2, Anomaly Detection Prathima Janakiram on February 22, 2024 at 7:39 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589018-5F64PF.gif","datePublished":"2024-02-23T00:50:56+00:00","dateModified":"2024-02-23T00:50:56+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589018-5F64PF.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589018-5F64PF.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/identify-weak-links-in-your-application-stack-part-2-anomaly-detection-prathima-janakiram-on-february-22-2024-at-739-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Identify Weak Links in Your Application Stack \u2013 Part 2, Anomaly Detection Prathima Janakiram on February 22, 2024 at 7:39 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=2536"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2536\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/2537"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=2536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=2536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=2536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}