Autonomous monitoring uses machine learning to catch incidents and show you root cause. No more staring at dashboards and hunting for root cause.
It works with any app - all you have to do is install a lightweight log and metric collector. You never have to define a manual alert rule again.
With zero human effort (no config, no alert rules, no pre-training, etc.), Zebrium automatically finds incidents in you logs and metrics (see How it Works for more details).
Each incident is presented as a clear set of events and charts showing root cause and symptoms.
Click here for detailed examples of Zebrium detected incidents.
If you already have other tools (e.g. Incident Management system, monitoring, observability, APM, etc.), Zebrium can help in two ways:
To learn more see How it Works.
Logging, metrics and observability tools were built around aggregation, dashboarding, search and rule-based alerts. Some have evolved to include anomaly detection (outlier detection) - mostly in metrics. This kind of anomaly detection can be useful when drilling-down on a problem, but it tends to suffer from too many false positives.
Zebrium detects anomalies in logs and metrics but also uses a layered machine learning approach to find hotspots of abnormally correlated anomalous patterns. This results in extremely accurate "Incident Recognition" - the ability to detect unknown incidents and characterize their root cause.
And Zebrium is also a full-blown log management and monitoring platform with all the features you'd expect.
Remember - Zebrium's ML Incident and Root Cause detection automatically finds what you previously needed to search for! But, if you need it, the platform also offer rich functionality to get more context on an incident or to drill-down into your logs and metrics.
For logs: we provide an aggregated explorer with full regex search, filtering, one-click charting, drill down, alerting and more. It's designed specifically for Developers and DevOps.
For metrics: easily select and chart any metric with a click and easily view correlations across different time-series. We also include full Grafana functionality for dashboarding directly within the UI.
We adhere to industry best practices for security including: encryption of data in flight, AES-256 encryption of data at rest, granular removal of sensitive records or fields, secure isolation of customer data and an option for a dedicated instance and VPC. All customer data will be deleted upon termination of service or by request. Read our security policy here.