{"id":365,"date":"2025-06-24T05:40:02","date_gmt":"2025-06-24T05:40:02","guid":{"rendered":"https:\/\/sreschool.com\/blog\/?p=365"},"modified":"2025-06-24T05:40:04","modified_gmt":"2025-06-24T05:40:04","slug":"anomaly-detection-in-devsecops-a-comprehensive-tutorial","status":"publish","type":"post","link":"https:\/\/sreschool.com\/blog\/anomaly-detection-in-devsecops-a-comprehensive-tutorial\/","title":{"rendered":"Anomaly Detection in DevSecOps \u2013 A Comprehensive Tutorial"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">\ud83d\udcd8 Introduction &amp; Overview<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">What is Anomaly Detection?<\/h3>\n\n\n\n<p>Anomaly Detection is the process of identifying unusual patterns, behaviors, or events in a dataset that do not conform to expected norms. In DevSecOps, anomaly detection enables proactive detection of security breaches, system failures, performance issues, or misconfigurations across software delivery pipelines.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">History and Background<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Early Usage<\/strong>: Initially used in fields like fraud detection, finance, and healthcare.<\/li>\n\n\n\n<li><strong>Adoption in IT<\/strong>: Transitioned into network security and system monitoring during the early 2000s.<\/li>\n\n\n\n<li><strong>DevSecOps Era<\/strong>: With the rise of automation and cloud-native environments, anomaly detection is now a core feature in platforms like AWS CloudWatch, Splunk, and Datadog.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Why is it Relevant in DevSecOps?<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detects security threats in real time without manual intervention.<\/li>\n\n\n\n<li>Monitors CI\/CD pipelines for behavioral deviations.<\/li>\n\n\n\n<li>Enhances observability and incident response.<\/li>\n\n\n\n<li>Aids compliance by identifying suspicious activities.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\udde0 Core Concepts &amp; Terminology<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Key Terms and Definitions<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Term<\/th><th>Definition<\/th><\/tr><\/thead><tbody><tr><td><strong>Anomaly<\/strong><\/td><td>A data point or pattern that deviates significantly from the expected behavior.<\/td><\/tr><tr><td><strong>Baseline<\/strong><\/td><td>The normal pattern of behavior used for comparison.<\/td><\/tr><tr><td><strong>Threshold<\/strong><\/td><td>A set value that determines when a deviation is flagged as anomalous.<\/td><\/tr><tr><td><strong>False Positive<\/strong><\/td><td>A legitimate activity incorrectly flagged as an anomaly.<\/td><\/tr><tr><td><strong>ML-Based Detection<\/strong><\/td><td>Machine learning techniques used to dynamically detect anomalies.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">How It Fits Into the DevSecOps Lifecycle<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>DevSecOps Phase<\/th><th>Role of Anomaly Detection<\/th><\/tr><\/thead><tbody><tr><td><strong>Plan<\/strong><\/td><td>Risk profiling and identification of historical anomaly patterns.<\/td><\/tr><tr><td><strong>Develop<\/strong><\/td><td>Monitors for suspicious code or dependency changes.<\/td><\/tr><tr><td><strong>Build\/Test<\/strong><\/td><td>Detects anomalies in build performance or test failures.<\/td><\/tr><tr><td><strong>Release\/Deploy<\/strong><\/td><td>Identifies irregular deployment behavior or rollbacks.<\/td><\/tr><tr><td><strong>Operate\/Monitor<\/strong><\/td><td>Observes runtime anomalies such as CPU spikes or unauthorized access.<\/td><\/tr><tr><td><strong>Respond<\/strong><\/td><td>Triggers incident response workflows on detection.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83c\udfd7\ufe0f Architecture &amp; How It Works<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Components<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Data Collection Agent<\/strong>: Gathers logs, metrics, or events.<\/li>\n\n\n\n<li><strong>Ingestion Pipeline<\/strong>: Normalizes and enriches data.<\/li>\n\n\n\n<li><strong>Anomaly Detection Engine<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Rule-Based<\/li>\n\n\n\n<li>Statistical<\/li>\n\n\n\n<li>Machine Learning<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Alerting &amp; Notification System<\/strong>: Sends alerts via email, Slack, or SIEM tools.<\/li>\n\n\n\n<li><strong>Dashboard<\/strong>: For visualization and analysis.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Internal Workflow<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>flowchart TD\n    A&#091;Data Sources] --&gt; B&#091;Ingestion &amp; Normalization]\n    B --&gt; C&#091;Detection Engine (Rules\/ML)]\n    C --&gt; D&#091;Alert Generator]\n    D --&gt; E&#091;Incident Management Platform]\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Integration Points<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CI\/CD Tools<\/strong>: Jenkins, GitLab CI, GitHub Actions (via webhooks or plugins).<\/li>\n\n\n\n<li><strong>Cloud Platforms<\/strong>: AWS (CloudWatch), Azure Monitor, GCP Operations.<\/li>\n\n\n\n<li><strong>Security Platforms<\/strong>: Splunk, Datadog, SIEM tools like Elastic Security.<\/li>\n\n\n\n<li><strong>Notification<\/strong>: PagerDuty, Opsgenie, Slack, email.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\ude80 Installation &amp; Getting Started<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Prerequisites<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Admin access to monitoring systems or observability tools.<\/li>\n\n\n\n<li>Docker (for containerized detection tools).<\/li>\n\n\n\n<li>Basic Python (for ML-based scripts).<\/li>\n\n\n\n<li>Cloud IAM credentials if deploying to AWS\/GCP.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Hands-On: Step-by-Step Guide (Using Prometheus + PyOD for ML)<\/h3>\n\n\n\n<p><strong>Step 1: Setup Prometheus to collect metrics<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>docker run -d -p 9090:9090 \\\n  -v \/your\/path\/prometheus.yml:\/etc\/prometheus\/prometheus.yml \\\n  prom\/prometheus\n<\/code><\/pre>\n\n\n\n<p><strong>Step 2: Export Prometheus metrics using Python<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>import requests\nimport pandas as pd\nresponse = requests.get('http:\/\/localhost:9090\/api\/v1\/query?query=node_cpu_seconds_total')\ndata = response.json()&#091;'data']&#091;'result']\n<\/code><\/pre>\n\n\n\n<p><strong>Step 3: Use PyOD for anomaly detection<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>from pyod.models.iforest import IForest\nfrom sklearn.preprocessing import StandardScaler\n\ndf = pd.DataFrame(data)\nscaler = StandardScaler()\nX_scaled = scaler.fit_transform(df&#091;&#091;'value']])\n\nmodel = IForest()\nmodel.fit(X_scaled)\npred = model.predict(X_scaled)\nprint(pred)  # 0 = normal, 1 = anomaly\n<\/code><\/pre>\n\n\n\n<p><strong>Step 4: Visualize with Grafana or trigger alerts<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udca1 Real-World Use Cases<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. <strong>Insider Threat Detection<\/strong><\/h3>\n\n\n\n<p><strong>Scenario<\/strong>: Sudden spike in access to secret environment variables.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tool: AWS GuardDuty + ML<\/li>\n\n\n\n<li>Outcome: Alert triggered and IAM user investigated.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">2. <strong>CI Pipeline Anomalies<\/strong><\/h3>\n\n\n\n<p><strong>Scenario<\/strong>: Jenkins pipeline fails repeatedly after successful runs.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cause: Malicious code commit<\/li>\n\n\n\n<li>Tool: Jenkins logs + anomaly detection plugin<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">3. <strong>Container Behavior Deviation<\/strong><\/h3>\n\n\n\n<p><strong>Scenario<\/strong>: Unexpected outbound traffic from a sidecar container.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tool: Falco + Sysdig<\/li>\n\n\n\n<li>Detection: Anomalous network calls not in baseline policy.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">4. <strong>Anomaly in Build Artifact Size<\/strong><\/h3>\n\n\n\n<p><strong>Scenario<\/strong>: Artifact size doubles suddenly.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cause: Embedded malware or uncompressed logs.<\/li>\n\n\n\n<li>Tool: Custom script + historical trend analysis.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\u2705 Benefits &amp; Limitations<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Key Advantages<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Real-Time Detection<\/strong>: Reduces MTTR (Mean Time to Recovery).<\/li>\n\n\n\n<li><strong>Automation-Friendly<\/strong>: Easily integrates with pipelines.<\/li>\n\n\n\n<li><strong>Scalable<\/strong>: Works in distributed cloud-native architectures.<\/li>\n\n\n\n<li><strong>Intelligent<\/strong>: Learns from historical data.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Common Challenges<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>False Positives<\/strong>: Can lead to alert fatigue.<\/li>\n\n\n\n<li><strong>Cold Start Problem<\/strong>: ML models need baseline training.<\/li>\n\n\n\n<li><strong>Data Quality<\/strong>: Inconsistent logs reduce accuracy.<\/li>\n\n\n\n<li><strong>Resource Intensive<\/strong>: ML engines can be compute-heavy.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udee1\ufe0f Best Practices &amp; Recommendations<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Security &amp; Performance<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use <strong>least privilege<\/strong> for data collection agents.<\/li>\n\n\n\n<li>Prefer <strong>streaming analysis<\/strong> for real-time environments.<\/li>\n\n\n\n<li>Enable <strong>rate-limiting<\/strong> on alerting systems.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Compliance &amp; Automation<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Align with <strong>NIST SP 800-137<\/strong> and <strong>MITRE ATT&amp;CK<\/strong>.<\/li>\n\n\n\n<li>Automate anomaly classification with rule-tagger systems.<\/li>\n\n\n\n<li>Log anomalies for <strong>audit trail<\/strong> and forensic investigations.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd01 Comparison with Alternatives<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Feature \/ Tool<\/th><th>Anomaly Detection (ML)<\/th><th>Static Rules<\/th><th>SIEM Systems<\/th><\/tr><\/thead><tbody><tr><td><strong>Adaptability<\/strong><\/td><td>High<\/td><td>Low<\/td><td>Medium<\/td><\/tr><tr><td><strong>False Positives<\/strong><\/td><td>Lower (after training)<\/td><td>High<\/td><td>Medium<\/td><\/tr><tr><td><strong>Setup Complexity<\/strong><\/td><td>Medium to High<\/td><td>Low<\/td><td>High<\/td><\/tr><tr><td><strong>Ideal Use Cases<\/strong><\/td><td>Dynamic environments<\/td><td>Simple checks<\/td><td>Compliance &amp; Correlation<\/td><\/tr><tr><td><strong>Real-Time Capability<\/strong><\/td><td>Yes<\/td><td>Limited<\/td><td>Yes<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">When to Choose Anomaly Detection<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>When you have <strong>high-frequency, dynamic data<\/strong>.<\/li>\n\n\n\n<li>When behavior <strong>cannot be fully expressed by rules<\/strong>.<\/li>\n\n\n\n<li>When <strong>false positives are costly<\/strong> (e.g., SRE teams).<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd1a Conclusion<\/h2>\n\n\n\n<p>Anomaly Detection is a critical capability in any mature DevSecOps pipeline. It empowers teams to identify threats, inefficiencies, and regressions proactively \u2014 before they impact production or compliance. From ML-driven observability to CI pipeline hardening, anomaly detection is reshaping how we secure and monitor modern systems.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udcd8 Introduction &amp; Overview What is Anomaly Detection? Anomaly Detection is the process of identifying unusual patterns, behaviors, or events [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-365","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Anomaly Detection in DevSecOps \u2013 A Comprehensive Tutorial - SRE School<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sreschool.com\/blog\/anomaly-detection-in-devsecops-a-comprehensive-tutorial\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anomaly Detection in DevSecOps \u2013 A Comprehensive Tutorial - SRE School\" \/>\n<meta property=\"og:description\" content=\"\ud83d\udcd8 Introduction &amp; Overview What is Anomaly Detection? Anomaly Detection is the process of identifying unusual patterns, behaviors, or events [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sreschool.com\/blog\/anomaly-detection-in-devsecops-a-comprehensive-tutorial\/\" \/>\n<meta property=\"og:site_name\" content=\"SRE School\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-24T05:40:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-24T05:40:04+00:00\" \/>\n<meta name=\"author\" content=\"priteshgeek\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"priteshgeek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sreschool.com\/blog\/anomaly-detection-in-devsecops-a-comprehensive-tutorial\/\",\"url\":\"https:\/\/sreschool.com\/blog\/anomaly-detection-in-devsecops-a-comprehensive-tutorial\/\",\"name\":\"Anomaly Detection in DevSecOps \u2013 A Comprehensive Tutorial - SRE School\",\"isPartOf\":{\"@id\":\"https:\/\/sreschool.com\/blog\/#website\"},\"datePublished\":\"2025-06-24T05:40:02+00:00\",\"dateModified\":\"2025-06-24T05:40:04+00:00\",\"author\":{\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db\"},\"breadcrumb\":{\"@id\":\"https:\/\/sreschool.com\/blog\/anomaly-detection-in-devsecops-a-comprehensive-tutorial\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sreschool.com\/blog\/anomaly-detection-in-devsecops-a-comprehensive-tutorial\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sreschool.com\/blog\/anomaly-detection-in-devsecops-a-comprehensive-tutorial\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sreschool.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Anomaly Detection in DevSecOps \u2013 A Comprehensive Tutorial\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sreschool.com\/blog\/#website\",\"url\":\"https:\/\/sreschool.com\/blog\/\",\"name\":\"SRESchool\",\"description\":\"Master SRE. Build Resilient Systems. Lead the Future of Reliability\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sreschool.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db\",\"name\":\"priteshgeek\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g\",\"caption\":\"priteshgeek\"},\"url\":\"https:\/\/sreschool.com\/blog\/author\/priteshgeek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Anomaly Detection in DevSecOps \u2013 A Comprehensive Tutorial - SRE School","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sreschool.com\/blog\/anomaly-detection-in-devsecops-a-comprehensive-tutorial\/","og_locale":"en_US","og_type":"article","og_title":"Anomaly Detection in DevSecOps \u2013 A Comprehensive Tutorial - SRE School","og_description":"\ud83d\udcd8 Introduction &amp; Overview What is Anomaly Detection? Anomaly Detection is the process of identifying unusual patterns, behaviors, or events [&hellip;]","og_url":"https:\/\/sreschool.com\/blog\/anomaly-detection-in-devsecops-a-comprehensive-tutorial\/","og_site_name":"SRE School","article_published_time":"2025-06-24T05:40:02+00:00","article_modified_time":"2025-06-24T05:40:04+00:00","author":"priteshgeek","twitter_card":"summary_large_image","twitter_misc":{"Written by":"priteshgeek","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sreschool.com\/blog\/anomaly-detection-in-devsecops-a-comprehensive-tutorial\/","url":"https:\/\/sreschool.com\/blog\/anomaly-detection-in-devsecops-a-comprehensive-tutorial\/","name":"Anomaly Detection in DevSecOps \u2013 A Comprehensive Tutorial - SRE School","isPartOf":{"@id":"https:\/\/sreschool.com\/blog\/#website"},"datePublished":"2025-06-24T05:40:02+00:00","dateModified":"2025-06-24T05:40:04+00:00","author":{"@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db"},"breadcrumb":{"@id":"https:\/\/sreschool.com\/blog\/anomaly-detection-in-devsecops-a-comprehensive-tutorial\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sreschool.com\/blog\/anomaly-detection-in-devsecops-a-comprehensive-tutorial\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sreschool.com\/blog\/anomaly-detection-in-devsecops-a-comprehensive-tutorial\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sreschool.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Anomaly Detection in DevSecOps \u2013 A Comprehensive Tutorial"}]},{"@type":"WebSite","@id":"https:\/\/sreschool.com\/blog\/#website","url":"https:\/\/sreschool.com\/blog\/","name":"SRESchool","description":"Master SRE. Build Resilient Systems. Lead the Future of Reliability","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sreschool.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db","name":"priteshgeek","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g","caption":"priteshgeek"},"url":"https:\/\/sreschool.com\/blog\/author\/priteshgeek\/"}]}},"_links":{"self":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/comments?post=365"}],"version-history":[{"count":1,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/365\/revisions"}],"predecessor-version":[{"id":366,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/365\/revisions\/366"}],"wp:attachment":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/media?parent=365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/categories?post=365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/tags?post=365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}