Читать книгу Machine Learning Techniques and Analytics for Cloud Security - Группа авторов - Страница 87

4.9.3 API Data

Оглавление

At first, we analyze the results obtained from Google Cloud Console and provided them sequentially (Figures 4.10, 4.11, 4.12, and 4.13) below. Figure 4.10 exhibits the operational workbook with API keys, whereas in Figure 4.11, corresponding graphs are provided in different days, as obtained from cloud console. Traffic variations, corresponding error, and median latency for the same days are provided in that plot.


Figure 4.10 API keys operational workbook.


Figure 4.11 API graphs from Google Cloud Console.


Figure 4.12 API data call counter log.


Figure 4.13 API data push and pull traffic data graph.

For different APIs, call log is extremely important in order to note down the busy schedule. Therefore, important APIs like Google Assistance, JavaScript, Directions, YouTube, and custom search are noted. This is shown in Figure 4.12. In this case, it is also important to get view about the variations of traffic, as shown in Figure 4.13.

Machine Learning Techniques and Analytics for Cloud Security

Подняться наверх