ハイブリッドネットワークの根本原因を数分で特定するAIの仕組み

【新着ウェビナー】

ハイブリッドネットワークの根本原因を数分で特定するAIの仕組み

【新着ウェビナー】

On this page

Why Network Operations Needs Data-Centric AI

The discussion around AI in infrastructure and operations has become increasingly model-centric. Teams want to know what model a platform uses, how current it is, how much reasoning capacity it has, and how quickly it can be updated as the model landscape shifts. Those are reasonable questions, but they tend to arrive too early. In production operations, the more consequential question is what happens to the data before any model is asked to interpret it.

This is not a philosophical distinction, but an architectural one. 

In network operations, AI systems are not operating on neatly prepared datasets. They are operating on a live, noisy, uneven stream of telemetry that spans metrics, logs, events, topology, configuration, and change activity. The inputs come from different systems, arrive in different formats, and carry very different amounts of context. Some are structurally rich but operationally ambiguous. Others are operationally meaningful but difficult to relate to adjacent signals. If that data enters the platform without normalization, enrichment, and a coherent representation of network context, the quality of the AI output is constrained from the start.

This is why the next phase of operational AI will be shaped less by the choice of model than by the quality of the data architecture supporting it. The systems that deliver reliable outcomes will be the ones that treat representation, context, and causal reasoning as first-order engineering problems rather than assuming a model can infer its way through fragmented telemetry after the fact.

Operations data is not scarce. It is under-modeled.

The challenge in modern network environments is not acquiring telemetry. Most teams already have more than enough. The challenge is that telemetry is usually collected in forms that reflect the boundaries of tools rather than the structure of the network itself.

Metrics arrive through one path, logs through another, topology through another, and event streams through still another. Each source preserves something valuable, but the relationship between those signals is often weak by the time they meet in a downstream analytics system. That forces the platform to reconstruct operational meaning after ingestion, which is usually the hardest and least reliable place to do it. 

In practice, this is why troubleshooting still becomes labor-intensive in environments that are otherwise heavily instrumented. The organization has no shortage of data. What is lacks is a shared, machine-readable representation of how the environment behaves, what relationships matter, and which signals should be interpreted together. 

A strong operational AI system has to solve that problem before it tries to sound intelligent. 

The data layer is where operational intelligence begins

The first requirement is a high-throughput ingestion and normalization layer that can absorb data from both modern telemetry pipelines and older operational systems without flattening everything into generic events. Scale matters, of course, but throughput alone is not what makes the architecture effective. The essential step is turning incoming data into a standardized representation that preserves operational meaning.

That means aligning the data to the vocabulary of the environment: devices, interfaces, services, topology relationships, and organizational labels that reflect how teams actually run the network. It means treating metrics and events not as isolated records but as signals that belong to a broader operational graph. And it means preserving enough structure that downstream models can reason over the data consistently, even when the original sources are heterogeneous.

This is the part of the AI stack that receives the least public attention because it does not demo well. It is not conversational. It does not produce immediate, visible novelty. But it is the layer that determines whether everything above it will be useful or merely articulate.

When the data architecture is weak, AI systems spend their time compensating for missing context. When the data architecture is strong, models can operate within a much narrower and more reliable problem space.

Signal detection has to be local, adaptive, and domain-aware

Once the data is normalized, the next challenge is separating signal from volume. That requires more than thresholding and more than a single generalized anomaly model.

Operational data has different statistical and semantic properties depending on the source. Time-series telemetry benefits from models that learn local behavior at the level of individual signals rather than imposing one notion of normal across the entire environment. In practice, that means lightweight models for each time series, continuously retrained on recent data so that anomaly detection reflects the actual operating conditions of that system rather than a stale baseline.

Logs present a different problem. They are semantically dense, operationally uneven, and frequently dominated by repetition. Their value depends on whether the platform can distinguish routine textual noise from events that materially change the meaning of an incident. This is where small language models and NLP techniques are often more useful than large generative systems. The goal is not to produce elegant prose. The goal is to classify meaning accurately enough that the platform can suppress irrelevant noise and preserve the few log events that carry real diagnostic value.

That distinction matters. In operations, language understanding is most effective when it improves the quality of the signal before broader reasoning begins. The system does not become more trustworthy because it can narrate an incident well. It becomes more trustworthy because it has learned how to reduce ambiguity in the raw data that feeds the incident in the first place.

Correlation is only meaningful when context survives ingestion

By the time an AI system begins correlating anomalies, many design decisions have already been made. If context has been dropped, if source relationships have been weakened, or if event semantics have been generalized too aggressively, correlation quality will degrade no matter how advanced the model appears at the interface.

Useful correlation in network operations depends on at least two forms of structure. The first is spatial structure: shared devices, interfaces, IP space, and topology relationships. The second is temporal structure: co-occurrence within meaningful windows, sequence patterns, and the ordering of related changes and symptoms. Those are not optional refinements. They are the basis on which the platform determines whether two anomalies are likely part of the same operational event.

A well-designed system uses those dimensions to group related anomalies into coherent units of activity rather than leaving operators to reconcile dozens of isolated alerts manually. This is where many platforms still fall short. They can surface anomalies, and they can often rank them, but they struggle to create a stable representation of the incident as a whole. The result is a long list of suspicious activity rather than an operationally useful model of what is happening.

What operators need instead is a clustered view of related activity that reflects actual relationships in the environment. Once those clusters exist, the platform can reason over them as structured episodes rather than disconnected artifacts. That changes the quality of the investigation because it moves the system from alert management toward incident formation.

The transition from correlation to causation is where trust is earned

Correlation is necessary in network operations, but it is not sufficient. A platform can know that several anomalies belong together and still fail to determine what actually caused the outcome. That gap is where trust is either built or lost.

Causation modeling requires more than temporal overlap and similarity scoring. It requires topology-aware reasoning and domain logic that can separate a root event from its downstream effects. A device reboot, a link failure, a routing adjacency change, and an application path issue may all appear within the same operational window. Treating them as related is useful. Determining the directional chain between them is what makes the result actionable.

This is also the point at which technical architecture begins to matter more than interface design. If the system can show how telemetry was normalized, how signals were filtered, how anomalies were grouped, and how the causal chain was inferred, then operators can evaluate the output as engineering. If it cannot, the output may still sound plausible, but it will remain difficult to trust under pressure.

That is especially important as the industry moves beyond incident summarization and toward agentic execution. Any platform that intends to support automated remediation—rerouting traffic, draining affected links, or initiating recovery actions—has to produce more than a probable explanation. It has to provide deterministic enough insight that teams are willing to operationalize it. Automation is not held back by a lack of language fluency. It is held back by uncertainty about whether the platform understands cause and effect well enough to act safely.

Large language models have an important role, but not the central one

This is where the role of large language models needs to be framed more precisely.

LLMs are extremely useful in operations when they sit at the presentation layer. They can translate complex system output into incident narratives, answer follow-up questions, summarize ongoing activity, and surface the right explanation in the channel where engineers are already working. They are well suited to turning structured reasoning into accessible language.

What they should not be asked to do is compensate for weak upstream architecture.

If the system relies on the LLM to discover meaning inside raw, poorly normalized telemetry, the result will be inherently less stable and less explainable. If, instead, the heavy lifting has already been done by the data pipeline, signal detection layer, reasoning framework, and causation model, then the LLM becomes a highly effective interface to a much more trustworthy system.

That approach also produces a healthier architecture over time. It keeps the core intelligence of the platform in the data and reasoning layers rather than tying it to the strengths and weaknesses of any single model generation. It allows the presentation layer to evolve as models improve without forcing the rest of the system to inherit the volatility of the broader model market.

In practice, that is a more mature way to build AI for operations. It uses language models where they add the most value while preserving a deterministic foundation underneath.

Why this will matter more, not less, over the next few years

As operations teams push toward more autonomous workflows, the standards for trust will rise. Summary quality will not be enough. Recommendation quality will not be enough. Teams will need systems that can support action with traceability, local context, and explicit reasoning over how an incident formed.

That is why the most important question for operational AI is gradually shifting. It is no longer just which model is on top of the stack. It is what the platform has done with the data before the model ever sees it.

Has the telemetry been normalized into a consistent representation? Has context been preserved across sources? Has noise been reduced with techniques appropriate to each signal type? Has the system reasoned across topology and time rather than merely aggregating alerts? Can it distinguish correlation from causation? Can it support human trust and, eventually, automated action?

Those are not branding questions. They are architecture questions. And they are the ones that will decide which AI systems become part of real operational workflows and which remain limited to demos and summaries.

The broader market will continue to talk about models because models are easy to compare from the outside. But inside production environments, the systems that matter will be the ones that treated data architecture as the real foundation of operational intelligence from the beginning.

Stay Connected

Selector is helping organizations move beyond legacy complexity toward clarity, intelligence, and control. Stay ahead of what’s next in observability and AI for network operations: 

このサイトは開発サイトとして wpml.org に登録されています。remove this banner のキーを使用して本番サイトへ切り替えてください。