Fig. 8From: Anomaly detection in microservice environments using distributed tracing data analysis and NLPThis Figure depicts the Likelihood of detecting unexpected keys over the traces obtained from the three mentioned scenarios. AÂ In this scenario, CPU-related anomalies were injected into the system. BÂ In this scenario, disk-related anomalies were injected into the system. CÂ In this scenario, a new release of the application without injecting anomaly was investigatedBack to article page