Skip to main content

Advances, Systems and Applications

Fig. 8 | Journal of Cloud Computing

Fig. 8

From: Anomaly detection in microservice environments using distributed tracing data analysis and NLP

Fig. 8

This Figure depicts the Likelihood of detecting unexpected keys over the traces obtained from the three mentioned scenarios. A In this scenario, CPU-related anomalies were injected into the system. B In this scenario, disk-related anomalies were injected into the system. C In this scenario, a new release of the application without injecting anomaly was investigated

Back to article page