Pattern Anomaly Monitor

Learn how to create and configure a Pattern Anomaly Monitor in the Edge Delta web application to detect and alert on anomaly spikes.

Overview

The Pattern Anomaly Monitor alerts you about a threshold of anomaly spikes in a specific time frame and for the configured source scope. You can use the alert to begin an investigation, such as by checking OnCall AI Analysis in the Logs - Anomalies page.

Create a Pattern Anomaly Monitor

To create a Pattern Anomaly monitor:

  1. Click Monitors and select the Triggered tab.
Screenshot Screenshot
  1. Click + New Monitor and select Pattern Anomaly.
Screenshot Screenshot

Configure Pattern Anomaly Monitor

The Pattern Anomaly Monitor evaluates the Pattern Anomaly count across all agents in the pipeline. In this example the anomaly count is grouped by pipeline.

Screenshot Screenshot

Monitor Scope

  • Source: Use autocomplete to select the sources you want to monitor. For example you can specify a number of agent tags. If you leave this blank all sources will be monitored.
  • Group by: You can group the monitored item by dimensions such as the agent tag, host, namespace etc. This option is required if you want to split notifications by group such as namespace. See Monitor Limits for group-by limits.

Alert Conditions

Configure the thresholds that the monitored item should be evaluated against in this section.

  • You can choose to trigger when the evaluated value is Above, Above or equal to, Below or Below or equal to the thresholds.
  • You can select a warning and an alert thresholds. As you add the thresholds they are displayed in the graph relative to the current source’s values.
  • The Sensitivity is used to generate the pattern value, which is the number of spikes. The baseline value is determined for the preceding 4 hours. A lower sensitivity will recognize and count more spikes, resulting in more alerts. As you change the sensitivity you can view the number of spikes entering the warning and alert zones in the graph, and adjust accordingly.

Notification

See Monitor Notifications

Screenshot Screenshot

To use source fields in the notification you must specify them in the Group By field in the Monitor Scope section and in the Group notifications by field in the Notifications section.

Route Alerts to AI Teammates

Pattern anomaly monitors can route alerts to AI teammates for autonomous investigation. When configured, teammates receive the alert context and begin analyzing the anomaly without manual intervention.

Configuration

To route pattern anomaly alerts to AI teammates:

  1. In the Notification section, add an AI Team channel as a notification destination
  2. Configure the escalation states (WARN to ALERT) to control when teammates engage
  3. Optionally group anomalies by attributes such as service name to help teammates scope their investigation

What Happens When an Alert Routes to AI Team

When an anomaly alert arrives, the assigned teammate:

  1. Pulls relevant logs, metrics, and traces from the affected pipeline
  2. Identifies likely root causes based on the pattern content
  3. Reviews historical trends to determine if similar patterns occurred before
  4. Examines related services for correlated errors
  5. Proposes mitigation steps with links to the relevant anomaly events

This workflow proceeds autonomously, with findings posted back to the channel for review. See Specialized Teammates for details on the investigation workflow.