Patent attributes
Techniques are described for error log anomaly detection. In an implementation, error logs from an application are processed to generate training data. The error logs, for instance, are processed to remove personal information and other data such as numerical strings. The processed error logs are converted into embeddings to generate the training data. The training data is utilized to train an anomaly detection model. For instance, as part of training the anomaly detection model, an anomaly threshold is defined based on a loss value determined from output of the anomaly detection model. Further error logs from the application are then processed by the trained anomaly detection model to determine which of the further error logs are error anomalies, such as based on comparing loss values for the further error logs to the anomaly threshold.