Manual Chapter :
API Protection Profile dashboard charts
Applies To:
Show VersionsBIG-IP APM
- 15.1.10, 15.1.9, 15.1.8, 15.1.7, 15.1.6, 15.1.5, 15.1.4, 15.1.3, 15.1.2, 15.1.1, 15.1.0
API Protection Profile dashboard charts
The API Protection Profile Dashboard displays several
charts that can be used for troubleshooting API servers associated with one API protection
profile.
Chart | Use |
---|---|
API Status | Review overall total traffic statistics to see what
percentage of problems are occurring at the API protection proxy and which ones occur
at the API server. |
Proxy Rejections and Server Errors Analysis | Here you can see the rejections and errors classified into
more specific reasons. For example, the number of API server errors are classified as
having returned 4xx or 5xx HTTP status codes, or connection failures. Access
rejections are grouped by what caused the problem including invalid signatures,
expired tokens, or connection failures. |
API Response Time | Response time is how long it takes from the time the
BIG-IP system receives an API request, sends it to the API server, where it is
processed and sent back to the BIG-IP system, and the last packet of the response is
returned to the client. The bar chart breaks down how the time is being spent. Is it
processing on the API server, processing the API request, or processing the API
response? |
Traffic Distribution | Breaks down the traffic by client type, client operating system, and
authentication method. If the IP Reputation Database is licensed, you see information
on IP addresses stopped for reasons specified in the database. For example, Spam
Sources, Windows Exploits, Web Attacks, DoS attacks, and so on. |
Traffic by Geolocation | Shows a map of the world shaded darkest in areas where most of the traffic is
coming from. |
Traffic per [All Servers, IP address of specific
endpoint] | Shows the numbers of successful and failed connections and
responses for all API servers or for a specific endpoint IP address. |
Security Events | Displays Advanced WAF security events including the number
of web application attacks, violating source IP addresses, and malicious transactions.
You can also display the events by attack type, violating IP address, violations, and
violation rating. |
Traffic by Endpoints | Shows the endpoints (such as GET, PUT, POST or DELETE methods) and number of
requests for each one. |
Traffic by [User ID, User Group ID, Client App ID, Service
Tier, Organization ID] | Displays the number of requests by the selected category. |