Your Data: Events, Metrics, Anomalies, and Security

This topic describes the external events and metrics that Express can ingest, how Express detects metric anomalies in real time, and the Express features that keep your data secure.

Metric and event ingestion

The first step in the data pipeline is to ingest monitoring metrics and events of interest from your infrastructure. Expressincludes the following integrations:

  • The Moogsoft Collector, an easy-to-install agent that collects server, Docker, and other metrics on Linux servers. You can deploy collectors on nodes throughout your physical, virtual, and cloud infrastructure.

    The Collector includes an extensible framework that supports data collection from additional services and platforms.

  • An AWS CloudWatch integration for ingesting cloud metrics.

  • A Metric API for ingesting time series metrics from external monitors.

  • An Events API for ingesting data from external tools such as AppDynamics, New Relic, and DataDog.

    The metric and events schemas are both highly generic and flexible. Each schema has a small set of required data fields and support for additional fields.

Metric anomaly detection

Express uses advanced analytics to identify performance anomalies on each time series metric. Each metric anomaly is considered an event of operational significance.

You can configure anomaly detection on a per-metric basis. For example, you can configure Express to ignore "raw" data points and ingest anomalies only for specific metrics. This can greatly reduce bandwidth consumption in high-traffic environments.

The Moogsoft Collector detects anomalies immediately on the installed host. This reduces the latencies involved in transferring and analyzing raw data from many different sources in a central location.

Security features

Moogsoft is strongly committed to the security of all customer data. Express uses a wide array of security features to prevent anyone from accessing, using, or disclosing your data.

  • All instances are hosted using Amazon Web Services and use the full spectrum of security features included with AWS.

  • All public-facing endpoints, and all web-traffic ingresses into the private network, use TLS v1.2 and 256-bit Advanced Encryption Standard.

  • All services that persist data use encryption at REST.

  • All customer authentications use Auth0, which provides secure user sign-up, sign-in, and access control.