In the attached example will provide structured steps to configure anomaly detection for Disks on the monitored host.
Either having:
- Cluster admin permissions will unlock the gates for all configurations and innovations.😉
- Without cluster admin permission, DT admin 👩💻will provide you the below privileges.😊
🍬🍮
BR,
Peter.