Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

rule-based AD customer success story #3571

Open
wants to merge 6 commits into
base: main
Choose a base branch
from

Conversation

kaituo
Copy link
Contributor

@kaituo kaituo commented Jan 24, 2025

Description

This PR contains the content for publishing the blog on rule-based AD customer success story.

Issues Resolved

#3560

Check List

  • Commits are signed per the DCO using --signoff

By submitting this pull request, I confirm that my contribution is made under the terms of the BSD-3-Clause License.

## Enhanced Features: Customizable Suppression Rules
To address these challenges, we've implemented significant improvements in OpenSearch 2.17 and above, focusing on Customizable Suppression Rules. This enhancement allows users to set specific thresholds to ignore anomalies based on both absolute values and relative percentages.

The suppression rules feature is particularly powerful for handling common scenarios that previously generated false positives. For example, in monitoring transaction volumes, EBSCO could configure rules to suppress alerts when variations stay within expected thresholds (such as ignoring drops less than 25% and increases greater than 50% above normal levels), while still detecting significant drops that might indicate real issues.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We can also add this as a last paragraph to the enhancement section:

Additionally, in OpenSearch 2.19 and above, we have added the capability for users to add more general criteria for what a detector will consider as an anomaly. Each feature in a detector can now be configured so that we only look at either spikes or dips in the data for that feature. For example, if a user is configuring a feature which looks at CPU data across their fleet, they can configure their features so anomalies are only detected if the actual values are higher than the expected values because of a spike in CPU. A dip in CPU in this case would not trigger anomalies.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

will do

@amitgalitz
Copy link
Member

Additional screenshots that can be used with the feature direction
Screenshot 2025-01-27 at 11 24 18 AM

Signed-off-by: Kaituo Li <[email protected]>
Signed-off-by: Fanit Kolchina <[email protected]>
Signed-off-by: Fanit Kolchina <[email protected]>
Copy link
Collaborator

@natebower natebower left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@kolchfa-aws Editorial review complete. Please see my comments and changes and let me know if you have any questions. Thanks!

_community_members/kaituo.md Outdated Show resolved Hide resolved
_posts/2025-01-23-ad-rule-cx-success.md Outdated Show resolved Hide resolved
---

As organizations increasingly rely on cloud services, monitoring and detecting anomalies in system behavior has become crucial for maintaining reliable operations. In this post, we'll explore recent improvements to Amazon OpenSearch Service's Anomaly Detection (AD) feature, highlighting how these enhancements have helped EBSCO Information Services optimize their transaction logging system monitoring.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Note: AWS does not appear to use AD as an abbreviation for anomaly detection, nor do they capitalize it as a proper noun when talking about it as a feature.

_posts/2025-01-23-ad-rule-cx-success.md Outdated Show resolved Hide resolved
_posts/2025-01-23-ad-rule-cx-success.md Outdated Show resolved Hide resolved
_posts/2025-01-23-ad-rule-cx-success.md Outdated Show resolved Hide resolved
_posts/2025-01-23-ad-rule-cx-success.md Outdated Show resolved Hide resolved
_posts/2025-01-23-ad-rule-cx-success.md Outdated Show resolved Hide resolved
_posts/2025-01-23-ad-rule-cx-success.md Outdated Show resolved Hide resolved
_posts/2025-01-23-ad-rule-cx-success.md Outdated Show resolved Hide resolved
Co-authored-by: Nathan Bower <[email protected]>
Signed-off-by: kolchfa-aws <[email protected]>
@kaituo
Copy link
Contributor Author

kaituo commented Feb 5, 2025

@kolchfa-aws @natebower After the editorial review is complete, please hold off on merging. I still need to coordinate with the customer to have them submit their security review.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants