AI for Network Leaders — Powered by Selector

Virtual sessions available on-demand now!

AI for Network Leaders — Powered by Selector

Virtual sessions available on-demand now!

On this page

Why Selector’s SREs Chose Selector for Kubernetes and Multi-cloud Application Observability

Selector offers comprehensive monitoring, observability, and AIOps solutions for service providers and enterprises. The process begins with collecting, aggregating, and analyzing multi-domain operational data from various sources, such as SNMP, streaming telemetry, syslogs, and Kafka. Selector then applies advanced AI/ML techniques to power features such as anomaly detection, event correlation, root cause analysis (RCA), smart alerting, and a conversational GenAI-driven chat tool, Selector Copilot. 

We decided early on that these capabilities would help us observe our own customer deployments. In this post, we’ll explore why we chose to leverage Selector to monitor Selector’s customers.

The Foundation: Kubernetes 

Depending on the nature of an organization’s infrastructure, customers elect to deploy Selector on-premises (on-prem) or in the cloud. To address this, the founding engineers at Selector leveraged a Kubernetes native stack. This approach enables our team to deploy the same software on-prem and in the cloud.

While a Kubernetes-based microservices architecture enables a uniform deployment experience, it does introduce operational complexities for Selector’s site reliability engineers (SREs). 

Specifically, how does a Selector SRE determine a “healthy” Selector Instance? It all comes down to monitoring a complex list of Key Performance Indicators (KPIs). Below are some critical KPIs that are indicative of an instance’s good or bad health.

  • Is the Kubernetes (K8s) control plane running well?
  • Is the load uniformly distributed across the compute nodes?
  • Is there enough storage? Is disk usage steadily creeping up, and do we need to add more before losing data?
  • Has the data ingest stopped from any source? 
  • Has a service crashed?
  • Do we need to scale out because of the high offered rate?

The challenge increases in scale and complexity due to hundreds of microservices running on an instance. The figure below shows a brief set of microservices that typically run in a production-grade deployment.

Figure 1: Microservices running within a typical Selector stack

Why We Chose Selector

Selector could have used any 3rd party tool such as DataDog, BigPanda, Dynatrace, or Grafana. However, each tool only monitors a specific element, such as service, compute, or Kubernetes clusters. As a result, it can only provide a partial view of all building blocks together. Moreover, integrating a third-party monitoring solution for the Selector platform could invite some challenges, such as:

  • They require the deployment of agents, which is not feasible due to our customers’ security policies. 
  • It is very hard — essentially impossible — to customize the analytics. 
  • A maze of dashboards made it impossible for our SRE team to determine what went wrong quickly. 
Figure 2: A maze of dashboards from different vendors

Due to the above limitations, we used Selector’s platform to observe our customer deployments. The capabilities that we offer to our customers would be very advantageous to our SRE teams. 

Selector’s platform, Selector Software Monitor (S2M), ingests metrics and logs from all customer instances. We started collecting a few thousand metrics from customer instances, but today, each instance emits more than a hundred thousand metrics. After ingesting all the metrics and KPIs, S2M does event correlation and deduplication, providing meaningful insights. If an issue is detected, the platform fires an alert on collaboration channels such as Slack, Microsoft Teams, etc. It enables our SREs to perform quick RCA of an issue, thus reducing the mean time needed to detect (MTTD) and repair (MTTR). 

Figure 3: Selector-on-Selector Workflow

An Example Workflow

The platform automatically detects and correlates abnormal issues in real-time. When the platform identifies a new problem, a correlation alert gets published to Slack:

Figure 4: Sample Slack alert

The following standout about this alert: 

  1. Proactive: The SRE has been informed that disk utilization will exceed 80% in the next 48 hours.
  2. Root cause:  The alert indicates the suspected microservice – “Reporting.” So, the bug/defect gets assigned to the right developer.
  3. Actionable:  The alert tells the SRE precisely what to do, i.e. Increase the Persistent Volume Allocation.
  4. Workflows: SRE can create an incident from Slack with a single click, which kicks off the triage actions.

The SRE can investigate the issue by clicking the Selector Software Monitoring (S2M) URL. The honeycomb dashboards below show a detailed view of the Customer BG instance. The platform goes deeper and provides insight into the service/KPI spiked in utilization. For example, the persistent volume (PV) is the offending KPI in the scenario below.

Figure 5: S2M Dashboard showing the exact PV with the problem

The SRE can then create JIRA tickets by right-clicking on the widget. The above example shows the complete automated workflow provided by the Selector platform, from alerting to identifying, analyzing, tracking, and closing an issue.

Summary

Selector-on-Selector is like monitoring a large-scale, highly distributed Software-as-a-Service (SaaS) application. Large applications require almost real-time observability and monitoring, which Selector’s product delivers. The platform’s ability to ingest data from any source, perform deduplication and correlation to detect anomalies, and generate alerts on any collaboration channel makes it an ideal choice for monitoring the Selector instances.

This feedback mechanism empowers Selector SREs to understand customer pain points better and focus on meeting customer objectives. 

More on our blog

The Business Case for AI-Driven Observability in Network Operations

Modern network operations generate an extraordinary amount of telemetry. Metrics, logs, events, topology data, cloud signals, and service context all contribute to a richer picture of system behavior. As environments expand across cloud, data center, edge, and SaaS, the opportunity for operations teams is clear: when that telemetry is unified and understood in context, it becomes a powerful source of resilience, efficiency, and business insight. That is why AI-driven observability has become such an important priority for IT and operations leaders. Its value comes from helping teams move through complex environments with greater clarity. Correlated signals, contextual awareness, and shared operational understanding help teams identify issues faster, coordinate more effectively, and resolve incidents with greater confidence. For business leaders, the conversation is increasingly practical. They want to understand how observability investments contribute to uptime, team productivity, operational scale, and service quality. AI-driven observability answers that question by connecting technical insight to measurable operational outcomes. AI-Driven Observability Creates Shared Operational Context One of the most valuable outcomes in modern operations is shared context. Network, infrastructure, cloud, and application teams all work with data that reflects real conditions in the environment. When that information is connected across domains, teams can align quickly around what is happening, what is affected, and where to focus first. Previous articles we’ve written point to this operational need consistently. Full-stack visibility, event correlation, data harmonization, and contextual intelligence all support the same outcome: helping teams see systems as interconnected environments. This gives engineers a clearer path from telemetry to understanding, and it helps leaders create more consistent operational workflows across distributed environments. Shared context also improves collaboration during incidents. A unified operational view helps teams work from the same narrative, which supports faster triage, clearer ownership, and smoother coordination across functions. In high-pressure moments, that alignment has direct business value because it reduces confusion, accelerates decisions, and supports service continuity. Business Value Begins With Faster Understanding In many organizations, the most important operational gain comes from shortening the path to understanding. When engineers have access to correlated, context-rich insight, they can move quickly from detection to investigation and from investigation to action. That acceleration matters because every operational delay carries a cost. Teams invest time in triage, collaboration, handoffs, and escalation. Business services may experience degraded performance. Internal teams lose productivity. Customer-facing systems carry increased risk. AI-driven observability supports a more efficient operating model by helping teams understand relationships across signals and by surfacing the context needed to act earlier in the incident lifecycle. This is one of the clearest ways to express the value of AI-driven observability to executive audiences. Faster understanding improves incident response, strengthens operational discipline, and helps organizations sustain service quality as complexity grows. The Metrics That Show Real Value A strong business case becomes much easier to communicate when it is anchored in a focused set of operational metrics. MTTR Mean Time to Resolution remains one of the clearest indicators of operational effectiveness. AI-driven observability contributes to MTTR improvement by helping teams identify likely cause, affected services, and relevant context earlier in the process. This supports a faster path to action and a more efficient incident lifecycle. Time to Identify Early understanding shapes the rest of the response cycle. A clear view of correlated events, dependencies, and service impact helps teams assign ownership quickly and move forward with confidence. Incident and Ticket Volume Correlated incident management supports a more focused operating model. When related events are grouped into context-rich incidents, teams can work from a smaller number of more meaningful operational objects. That improves efficiency and helps reduce cognitive load across NOC and operations teams. Escalation Patterns High-quality context supports better decision-making at every level of the organization. It allows frontline teams to act with stronger situational awareness and helps senior engineers focus their expertise where it can create the greatest impact. This contributes to healthier team capacity and more scalable operations. Operational Toil Operations leaders increasingly care about the amount of repetitive manual work surrounding incidents: reviewing duplicate alerts, switching across tools, reconstructing timelines, and coordinating repeated handoffs. AI-driven observability supports a cleaner, more streamlined workflow that improves engineer productivity and creates a better day-to-day operating experience. Translating Operational Gains Into Executive Language Executive stakeholders respond most strongly when technical improvements are connected to business outcomes. AI-driven observability lends itself well to that conversation because the operational gains are tangible. Time saved during triage translates into labor efficiency. Faster resolution supports uptime and service quality. More focused incidents help teams scale their efforts across larger, more distributed environments. Better context strengthens planning, prioritization, and cross-team coordination. These outcomes support resilience while also contributing to cost discipline and organizational agility. This is especially important in hybrid operations, where service performance depends on relationships across infrastructure, network paths, providers, and applications. In these environments, observability creates value by helping organizations understand system behavior holistically and act with a stronger operational foundation. AI-Driven Observability Supports Resilient Growth As digital environments grow, the need for clarity grows with them. More services, more interdependencies, and more distributed architectures all increase the importance of context-rich operational intelligence. AI-driven observability helps organizations meet that complexity with a model that supports resilience and scale. Data harmonization, event intelligence, natural language access, intelligent incident management, and agentic workflows all contribute to a future where operational teams can work with greater speed, confidence, and precision. That progression begins with observability that understands relationships across the environment and delivers insights in a form teams can use immediately. A Simple Framework for Proving Value For teams building the business case internally, the clearest approach is often the simplest. Start by establishing a baseline for incident response, escalation patterns, and operational effort. Track the time spent identifying issues, coordinating across teams, and resolving events. Then measure how AI-driven observability improves those workflows through richer context, better alignment, and faster understanding. From there, tie those improvements to the outcomes leadership cares about most: service reliability, productivity, operational scale, and customer experience. This gives observability

Solving the Ticket Noise Problem: What We Learned from Our ServiceNow Webinar

On March 18th, we hosted a session focused on a challenge that continues to undermine even the most mature IT operations teams: ticket noise.  It’s easy to dismiss noise as just “too many alerts”. But as we explored in the webinar, the real issue runs deeper. Ticket noise is a symptom of something more fundamental — a lack of correlation, context, and shared visibility across the stack.  If you weren’t able to attend, this blog walks through the key ideas, examples, and takeaways. And if any of this feels familiar, it’s worth watching the full session.  View “Solving the Ticket Noise Problem: Bringing Intelligence to ServiceNow”.  The Hidden Cost of Tickets Most organizations don’t struggle because they lack monitoring. In fact, the opposite is true — they have too much of it. Over time, teams adopt specialized tools for every layer of the environment: Each tool does its job well within its domain, but incidents don’t respect those boundaries. As discussed in the webinar, what emerges is a fragmented operational model: The result is a familiar pattern: alert storms, duplicated effort, and delayed resolution. To put things more bluntly, it becomes a data correlation problem rather than a monitoring problem.  Why Traditional ITSM Workflows Break Down Platforms like ServiceNow are central to how organizations manage incidents, but they are only as effective as the data they receive. When upstream systems generate noisy, uncorrelated alerts, ServiceNow becomes a reflection of that chaos: In the webinar, we walked through a scenario that highlights this breakdown. A single configuration change triggered an outage, resulting in dozens of alerts across different tools and teams. Each team began investigating independently, without a shared understanding of the root cause. What should have been a single incident turned into a multi-team firefight, slowing resolution and increasing operational risk. Rethinking the Model: From Alerts to Event Intelligence The core idea behind Selector’s approach is simple but powerful: Don’t manage alerts. Understand Events.  Instead of treating ever alert as a separate signal, Selector ingests telemetry across the entire stack — network, infrastructure, application, and cloud — and builds a correlated model of what’s actually happening.  This shift fundamentally changes how incidents are handled:  This is what we refer to as event intelligence — the ability to move from raw signals to actionable insight.  What This Looks Like Inside ServiceNow One of the most important aspects we covered in the webinar is how this intelligence translates into real operational workflows. Selector integrates directly with ServiceNow, but not in the traditional “forward alerts as tickets” sense. Instead, it transforms the structure and quality of what enters the system. Fewer Tickets, Higher Signal Rather than flooding ServiceNow with every alert, Selector creates correlated incidents. In one example shared during the session, a large-scale outage generated thousands of alerts in a traditional tool. Selector reduced that to just a handful of meaningful incidents, with each tied to a clear root cause. This dramatically reduces the cognitive load on engineers and allows teams to focus on resolution instead of triage. Bi-Directional Intelligence Another key differentiator is the bi-directional integration between Selector and ServiceNow. Selector doesn’t just push tickets into ServiceNow, but instead continuously exchanges information: This ensures that both systems remain aligned and eliminates the fragmentation that often occurs between monitoring and ITSM. It also enables smarter workflows, such as: From Basic Tickets to Actionable Context Perhaps the most meaningful shift is in the quality of each ticket. Traditional tickets often require engineers to begin their investigation from scratch. Selector changes that by embedding context directly into the incident: In effect, Selector elevates tickets from simple notifications to decision-ready artifacts, reducing the need for manual investigation and accelerating time to resolution. Real-World Examples To make this tangible, we walked through several real-world scenarios during the webinar. In one case, a failure in a network interface caused cascading issues across multiple access points. Without correlation, this would appear as a series of unrelated device failures. With Selector, the system identified the failing interface as the root cause and generated a single, context-rich incident, allowing the team to resolve the issue in under 30 minutes. In another example, a large SD-WAN outage impacted over 100 devices across dozens of sites. While other tools generated thousands of alerts, Selector reduced the situation to just a few actionable incidents. Engineers were able to coordinate quickly and focus on resolution rather than filtering out noise. These aren’t edge cases. These represent what happens when correlation is applied at scale. Why This Matters Now As environments become more distributed and complex, the cost of noise continues to rise. It’s not just about wasted time, but also: The organizations that succeed are the ones that move beyond monitoring and toward intelligent operations, where systems don’t just detect issues, but help explain and resolve them. The Takeaway Ticket noise isn’t solved by adding more filters, rules, or dashboards. It’s solved by changing how data is understood. By correlating events across the stack and delivering that intelligence into systems like ServiceNow, Selector enables teams to: Watch The Full Webinar This blog captures the core ideas, but the full session goes deeper into: Watch the full webinar on demand here.  Stay Connected Selector is helping organizations move beyond legacy complexity toward clarity, intelligence, and control. Stay ahead of what’s next in observability and AI for network operations: 

Cloud Observability Is Broken — Hybrid Operations Need a New Intelligence Model

Cloud adoption was supposed to simplify operations. Infrastructure would become programmable, scalability would become elastic, and distributed architectures would enable resilience at global scale. In practice, cloud has delivered extraordinary flexibility, but it has also introduced a level of operational complexity that traditional observability approaches were never designed to handle. Today’s enterprise environments are not simply “in the cloud.” They are hybrid ecosystems spanning multiple providers, regions, private infrastructure, edge locations, and interdependent network paths. Services operate across layers that are dynamically provisioned, continuously reconfigured, and often owned by different teams. Yet many organizations still approach cloud observability as if visibility alone is sufficient. It isn’t. The Visibility Paradox in Hybrid Cloud Environments Most enterprises have invested heavily in observability tooling. Metrics, logs, traces, flow telemetry, synthetic tests, and cloud-native monitoring capabilities generate unprecedented volumes of operational data. On paper, this should provide comprehensive visibility into system behavior. In reality, the opposite often occurs. Teams find themselves navigating fragmented dashboards and disjointed alert streams, each representing only a partial view of system state. A routing degradation may surface in network telemetry. A performance anomaly may appear in application metrics. A configuration drift may manifest in infrastructure logs. Individually, these signals are accurate. Collectively, they are ambiguous. This fragmentation creates what might be called the visibility paradox: more telemetry does not necessarily produce better operational insight. As hybrid architectures grow in scale and interdependence, outages rarely originate from a single component. They emerge from interactions between services, connectivity paths, and infrastructure layers. Understanding these interactions requires more than instrumentation. It requires context. Why Traditional Observability Models Fall Short Traditional observability frameworks were designed for relatively contained environments. They assume that system components can be monitored independently and that root cause can be inferred by analyzing deviations within each domain. Hybrid cloud environments invalidate these assumptions. Dependencies now extend across provider boundaries, network interconnects, and shared infrastructure layers. Performance degradations may originate in places where teams have limited visibility or control. Native cloud metrics may indicate healthy infrastructure even as user experience deteriorates along end-to-end delivery paths. This disconnect reflects a fundamental limitation: observability tools often analyze signals in isolation rather than preserving the relationships between them. As a result, operational teams must manually reconstruct context during incidents, slowing resolution and increasing risk. The operational burden shifts from interpreting system behavior to stitching together telemetry. Shifting From Observability to Operational Intelligence To address this challenge, organizations must evolve beyond traditional observability toward what might be described as operational intelligence. Operational intelligence is defined not by the quantity of telemetry available, but by the ability to understand how systems behave as interconnected ecosystems. It emphasizes correlation, dependency awareness, and causal reasoning over raw data collection. In hybrid cloud environments, this means: This shift fundamentally changes how incidents are investigated. Instead of reacting to alerts and validating assumptions manually, teams can operate with contextual awareness that guides decision-making from the outset. The Network Is the Missing Dimension of Cloud Operations One of the most persistent misconceptions in cloud operations is that infrastructure abstraction reduces the importance of network visibility. In reality, distributed cloud architectures make connectivity more critical than ever. Application performance often depends less on the health of individual resources and more on the reliability of the paths connecting them. Cross-region latency, interconnect failures, routing misconfigurations, and provider performance variability can all degrade service delivery even when underlying compute and storage resources appear stable. Without end-to-end path awareness, these issues are difficult to detect and diagnose. Operational intelligence frameworks address this gap by integrating network telemetry into broader observability models. By preserving path-level context alongside infrastructure and application signals, teams gain a more accurate representation of service health. This integrated perspective is essential for achieving true resilience in hybrid environments. Rethinking Capacity, Resilience, and Provider Strategy Hybrid cloud complexity also introduces new challenges in capacity planning and resilience engineering. Decisions about resource allocation, traffic routing, and provider selection increasingly depend on dynamic performance characteristics rather than static architectural assumptions. Operational intelligence enables more informed decision-making by analyzing utilization patterns and performance trends across regions and providers. Organizations can identify inefficiencies, anticipate bottlenecks, and optimize infrastructure investments based on empirical insights rather than reactive adjustments. Similarly, comparative visibility into provider performance supports more sophisticated resilience strategies. Enterprises can diversify critical service paths, mitigate dependency risks, and adapt to changing conditions with greater confidence. In this context, observability becomes a strategic capability rather than a purely technical one. The Future of Cloud Operations Is Context-Driven Hybrid cloud environments will continue to grow in scale and complexity. Emerging paradigms such as multi-cloud orchestration, edge computing, and AI-driven services will introduce additional layers of interdependence. Operational success will increasingly depend on the ability to understand system dynamics holistically. Organizations that remain reliant on fragmented observability models may find themselves constrained by reactive workflows and prolonged incident resolution cycles. Those that adopt intelligence-driven approaches will be better positioned to maintain service reliability and support innovation. The evolution from observability to operational understanding represents a broader shift in how enterprises manage digital infrastructure. It reflects a recognition that modern systems behave less like collections of components and more like interconnected ecosystems. In such environments, context is not a luxury. It is the foundation of effective operations. Stay Connected Selector is helping organizations move beyond legacy complexity toward clarity, intelligence, and control. Stay ahead of what’s next in observability and AI for network operations: 

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.