4.େنڥͱͷੑ
• ҙͷݖݶͰϢʔβʔΛΦʔΨχθʔγϣϯʢཧൣғʣϚοϐϯά
• ̎ஈ֊ೝূɺIPΞυϨε੍ݶɺೝূํ੍ࣜݶ ͳͲ
• খنʙେنڥ·Ͱద༻͍͢͠ߏ
User A
User B
User C
User D
Service A
Service B
Role 1
Role 2
Role 3
Host 1
Host 2
Host 3
Host 4
Read Write
Read Only
Owner
IP Address
Authentication
A.A.A.A
Service A
Service B
Role 1
Role 2
Role 3
Host 1
Host 2
Host 3
Host 4
Read Write
Read Only
Owner
IP Address
Authentication
A.A.A.A
Service A
Service B
Role 1
Role 2
Role 3
Host 1
Host 2
Host 3
Host 4
Read Write
Read Only
Owner
IP Address
Authentication
A.A.A.A
ΦʔΨχθʔγϣϯ
9
ΦʔΨχθʔγϣϯ
:
ΦʔΨχθʔγϣϯ
;
• ઌਐతͳΞʔΩςΫνϟͷੑ্
ίϯςφϑΝϯΫγϣϯΛ༻͍ͨαʔόϨεΞʔΩς
ΫνϟͳͲ
• TagͰྨʗू
αϙʔτ֓೦ͷ֦ॆ
Service
Role
Host Host Container Container Container Function Function
Tag
Role Role
Host Host
Role
Host Host
Container Function
AzureΠϯςάϨʔγϣϯ
• Microsoft AzureΛαϙʔτ
• Load Balancer, SQL Database, Redis
Cache ͳͲ
API
Slide 25
Slide 25 text
ϝτϦοΫσʔλ
• σʔλ্ཻ
• อ࣋ظ֦ؒு
Slide 26
Slide 26 text
ҟৗݕ
• ͍ͭͱҧ͏σʔλύλʔϯΛࣝผ
• ػցֶशͷΞϧΰϦζϜΛ׆༻
Anatomy of an anomaly detection model
https://techblog.expedia.com/2016/07/28/applying-data-science-to-monitoring/