In the below example will provide structured steps to configure host anomaly detection on the monitored host.
Either having:
- Cluster admin permissions will unlock the gates for all configurations and innovations.😉
- Without cluster admin permission, DT admin 👩💻will provide you the below privileges.😊









Hint:
- In case of custom threshold is the best suitable for the app owner feel free to enable the custom thresholds and adjust it as per app owner inputs.
🍬
👨💻
KR,
Peter.