The general configuration of Airlock Anomaly Shield including applications, triggers, and rules has been implemented in the Configuration Center UI. However, Anomaly Shield requires training data and some fine-tuning during operation to correctly detect anomalies. Some of these configuration tasks and fine-tuning require the use of CLI commands and manual changes outside the Configuration Center.
Besides general information about the available CLI tools, this chapter feature a simple BookShop application example for a cohesive series of exemplary brief instructions on how to train on, evaluate and analyze Airlock Anomaly Shield ML data.
Chapter content
Further information and links
- ●For general information about Airlock Anomaly Shield, see: Introduction and conception of Airlock Anomaly Shield
- ●For information about configuration, see: Airlock Anomaly Shield configuration