View Outlier Incidents
- Console
- IM Tools
- On the incident list page, outlier incidents display a prominent Outlier badge
- On incident details page, outlier incidents show a prominent Outlier badge and explanation at the top

Recognition Method
The system uses machine learning models to determine similarity between incidents. When similarity exceeds 90%, we consider two incidents similar. When judging similarity, we mainly consider these factors:| Factor | Description |
|---|---|
| Incident Title | Semantic similarity of title text |
| Incident Description | Semantic similarity of description content |
| Affected Service | Generally extracted from service label |
| Alert Resources in Incident | Generally extracted from resource label |
When the system detects no similar incidents in the past 30 days, it marks the incident as an outlier.
Enable and Disable
Outlier incident detection is configured at the channel level:FAQ
Does outlier incident detection need to be enabled separately?
Does outlier incident detection need to be enabled separately?
No setup or enabling needed. By default, all Professional subscription and above versions trigger outlier incident detection.
