GCP_API_Apigee
Entity
capabilities
Mediation - provide the ability to catch and manipulate the request: Transformation, Security, Abuse detection, etc
API Analytics
API Runtime - handling runtime API trafic
Developer ecosystem
Private Cloud
Onprem DataCenter
GCP
Apigee Adapter for Envoy
Operational metrics
Api metrics
Business metrics
Api monitoring and alerting
Monetisation
Marketplace
API catalog
API life-cycle
Design
click to edit
click to edit
click to edit
click to edit
click to edit
click to edit
click to edit
Design
click to edit
OpenAPI - public framework to describe the contract
Environments
Publishing
API proxies and Shared Flow
Runtime tokens
Config
Organisation
An Apigee organization is associated with a single Google Cloud project
click to edit
An Apigee organization is the top-level entity for Apigee.
Users
An environment is a runtime execution context for your APIs.
managed by IAM
security, rate limiting, message transformation, or mediation within the request and response flows of your proxy.
Shared flow - - Shared flows can be used to combine a set of policies into a common pattern, allowing reuse of proxy logic in multiple APIs.
APIs are exposed on Apigee by implementing API proxies
Deployed to environment
click to edit
click to edit
An organization might have three environments: development, test and production.
Users can be given different permissions in each environment. A developer might need full access in the development environment, but should have no write access in production.
Apigee organization admin has super user access within the organization.
Apps developer
Api Product
APPS
click to edit
click to edit
Keys token
click to edit
. Apps present API keys, and OAuth tokens to access APIs. When an API key or OAuth token is verified in an API proxy,
click to edit
the app making the request is identified, as is the associated API product.
Env mapping
data collectors
KVM
Flow hooks are used to automatically attach shared flows to every proxy in an environment. This allows admins to enforce that security, logging, or other common policies are executed for all proxies.
Proxy
Conditional Flow
Post Flow
Preflow
Endpoint
Proxy Endpoint
Target Endpoint
Structure
Hostnames: {dev}.google.com
Environments: {dev}-order-system, {dev}-inventory
Env group: dev, test, prod
Proxy
GET https//api.testapi.com/orders/v1/carts/1234
proxy: orders-v1
proxy.pathsuffix = /carts/1234
env - prod-order system
click to edit
env group - prod: based on "api.testapi.com"
Conditions
click to edit
can chain with AND OR
should return TRUE or FALSE
IF statement
predefined vars can be useful
has operators
Java regex
MatchedPath
Matches - any string match
all case sensitive
==
Policies
Extension
Mediation
Security
Traffic management
Callout
Call a shared flow
JS
Message logging
Java
OAuthV2
Basic Auth
JWT, SAML
HMAC
Verify ApiKey
CORS
click to edit
click to edit
click to edit
click to edit
click to edit
Cache response
click to edit
Enforse a reset quota
click to edit
Spike arrest
Data Capture
Preflow (always)
Step 1
Step 2
Conditional Flow 1
Step
Conditional Flow 2
Step
PostFlow (always)
Step
Route Rules
Route rules can enxicate, that we don't need the target endpoint
click to edit
click to edit
After evaluating Proxy endpoint, Route rules are evaluated, to determine the target endpoint
First matching route rule indicates the target endpoint
Response returns via the same Proxy and Target endpoint
Target Server Specification