Explaining API Management to a lay man

0Shares

I was thinking today on one scenario i.e. if I must teach API Management to a lay man how would I teach? I tried to convince myself that it would be very easy to do so. But at the first instance of thinking itself I got blocked. Then thought for a while and came up with this. Anyone who read this is requested to keep their knowledge aside and see if my article makes sense J Good luck with that!

So here is my imaginary story to teach API Management:

John works for a company called “checkphotos.com” and he has developed a software that takes a photo of a person’s face as an input and compares with the faces in their existing photo database and returns an indicator as an output that tells if it is found or not. He gave a demo to his team and everyone liked it.

Figure 1 – Face Feature comparison

His company has installed security cameras around their office and captured the photos of the people who come around and tested their software if it could identify the new faces captured in the photos and it was a huge success.

Then their company’s CEO wanted to enhance the software by integrating with their alerting system so that any new face should provide alert to the security team. John successfully integrated his application with their alerting system and it started working fine and provided alerts whenever there is no match found. Everyone appreciated John’s work.

Figure 2 – Integration with Alerting system

John documented the operations, sample input/output data and the application flow for other developers to integrate his application with theirs. John then named the document as “Face Recognition Software API”, where API means Application Programming Interface. Application Programming Interface is any program contract that helps other programs to consume the API application.

This news spread to other branches of his company and they also wanted to implement the recognition software in their offices and they wanted to reuse the application that John developed. So, John had to convert his application to be a service exposed on internet.

Figure 3 – API converted to a Service that can be exposed through internet

All the other branches successfully started consuming the recognition service developed by John and could use their centralized database to verify the face features. This has become a great implementation and news spread to other companies too.

Figure 4 – Service exposed to other offices through internet

At the beginning, everything went well. But, slowly the requests have been increased and the service was not able to cope up with the requests. So, John had to create two instances of the service and added a software that balances the requests to the service. It was called Load Balancer.

Figure 5 – Added a load balancer

The news spread to other companies and some two companies were interested in using the service developed by John. John’s CEO thought it would be benefiting to their company if they provide their software as a service and deploy it in Cloud.

John deployed the service in a cloud as cloud service and the two companies “signofface.com” and “verifyfaces.com” started consuming the service. It went well for a month. But, John had to setup a WebEx meeting with those two companies to explain them what he has done and went through the technical documents that developed. Whenever they had questions, he had to answer their questions.

Figure 6 – Moved the service to cloud

John started thinking how can he simplify the consumption of his service so that the developers who consume his service could do by themselves. Something like a “Self Service Portal” where the portal should have all the details required for consumption and the developers should be able to test his service with the supported operations without his involvement.

After a month, John faced these issues:

  • Requests tripled after a month and then it started multiplying by 10 times every day. This costed more for the company.
  • His company could not control the requests and they did not have any mechanism to control the number of requests.
  • Also, one hacking group attacked their service with DDOS attack by sending millions of requests per second. Their service went down for few days.
  • Since the service was consumed directly, whenever John had to change his service, his customers had to change their code.

John met the cloud architect Sam and presented him the issues that he was facing and then Sam proposed a solution for his issues. Then Sam mentioned that the cloud website has a feature called “API Management” and it should help him to solve his issues.

John logged into his cloud website and created an API Management Service from the “API Management” feature and he found that there are two different Portals available under the service: DEVELOPER and PUBLISHER.

He could access both as he was the administrator. He opened the PUBLISHER portal and created different consumer groups: FREE, PREMIUM and UNLIMITED. He configured FREE group with a setting that number of request allowed for a minute is 50 calls and 500 calls per week. He configured PREMIUM group with a setting that number of requests allowed for a minute as 1000 calls and 5 million per week. For UNLIMITED, he allowed unlimited calls.

He created Visibility groups for each consumer group: ADMINISTRATORS, DEVELOPERS, CONSUMERS. ADMINISTRATORS group consisted of his company administrators and others who would like to test the service and functionality were added to the DEVELOPERS group.

Each subscriber to the service needed to get approval from the administrator and he mapped DEVELOPERS with FREE group so that they can test but with limitations. Based on the consumer’s subscriptions they have been assigned with the consumer group. Each subscriber is provided with a subscriber ID and subscriber Password and they should send these while making the call.

This has provided control over the usage of the service. Also, instead of sharing his service load balancer endpoint, he gave the new endpoint that was generated by the API Management Service. The new endpoint acted as a proxy to his service and all the requests to the actual service must pass through the proxy service first. This has removed the dependencies between his service and the consumers. No one knew the actual load balancer endpoint anymore and so the service endpoint has become more secured.

He has added the operations supported by his service and the sample requests/responses and provided a mock endpoint that acts on behalf of his service for testing.

Figure 7 – Configured service using API Management Solution

Developers who subscribed to the service now got access to the DEVELOPER portal. Now developers could read the documentation and could test the operations supported by using testing console, that was using mock service and mimicking the actual environment. Developers found it to be very useful and they could also find a source for a code for consuming the service in different programming languages. Developers could integrate their applications and tested the functionality. No more John had to give demos or explain his service to the developers. This facilitated John to fulfill his goal of providing a Self Service Portal.

Also, he could view many analytics reporting showing the number of requests coming from each customer, failed and successful requests and the load per day, year and other graphs that could give him more insight into the requests. After this implementation, he found it to easily to scale his service based on the type of consumers and there were no more DDOS attacks.

Figure 8 – Analytics and Reporting features in API Management Solution

With this implementation of policies, security, groups in the API Management Solution and with the features available for generating reports and analytics about the usage, John’s company got full control over their service usage and began expanding their operations with more consumers on-boarding with more confidence.

 

0Shares