<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Designing a Real-Time Monitoring System for the AWS Cloud: An Adaptive Dashboard-Based Approach with Prometheus and Grafana *</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Abdou Wahidi BELLO</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Abdoul Kamal ASSOUMA</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tahirou DJARA</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francky Ruben</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bignon HOUENOU</string-name>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Cloud, AWS, Monitoring, Anomaly Detection  </string-name>
        </contrib>
      </contrib-group>
      <abstract>
        <p>In this paper, we implemented a comprehensive monitoring system for the AWS cloud environment. The developed architecture is based on a secure AWS infrastructure using Amazon VPC for network segmentation, EC2 instances for hosting services, and Amazon S3 for data storage. The monitoring system integrates Prometheus for metrics collection and storage, coupled with Grafana for visualization through interactive dashboards. The obtained performance results show average scraping times of 0.212 seconds and query latencies as low as 0.0021 seconds, enabling near real-time monitoring of over 1,279 metrics collected from 3 targets. Anomaly detection, implemented using the SH-ESD statistical model, demonstrated an accuracy of 88.85% on a sample of 330 data points. The model correctly identified 231 normal values and detected 29 anomalies during stress testing on EC2 instances. The automated alert system, managed by Alertmanager, ensures instant email notifications when critical thresholds are exceeded. This result confirms the robustness of the developed solution, providing proactive monitoring of the cloud infrastructure with rapid detection and response capabilities to incidents, while maintaining scalability in line with operational needs.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Cloud computing is emerging as a major revolution, particularly in the delivery of digital services.
This model is based on the offshoring of computing resources whether computing power, storage,
or applications to remote servers hosted in data centers accessible via the Internet. This approach
frees users from the traditional constraints of managing and maintaining local infrastructure, such
as purchasing expensive hardware, updating software, and managing hardware failures. However,
despite its many advantages, cloud computing is not immune to the challenges inherent in complex
IT systems, particularly when it comes to performance, reliability, and resource management. With
the massive migration of infrastructure to the cloud, traditional monitoring tools, designed for
static local environments, often prove inadequate. Furthermore, poor configuration of modern tools
dedicated to monitoring cloud infrastructure can exacerbate this situation. In this context,
opensource tools like Prometheus, designed for collecting and storing metrics, and Grafana, an
interactive visualization platform, have established themselves as benchmarks in the field of
monitoring in general. However, their potential remains under exploited when it comes to
monitoring specific cloud infrastructures, particularly on AWS. Faced with this observation, this
article proposes: a monitoring system optimized for the AWS cloud, based on the integration of
Prometheus and Grafana. Beyond this classic approach, we enrich this system by implementing an
anomaly detection based on the SH-ESD algorithm applied to CPU usage in our cloud environment.</p>
    </sec>
    <sec id="sec-2">
      <title>Literary review</title>
      <sec id="sec-2-1">
        <title>Cloud computing</title>
        <p>
          Cloud computing or simply cloud is a paradigm born from the evolution of the Internet and
virtualization. According to NIST (National Institute of Standards and Technology ) cloud
computing is a model enabling ubiquitous, convenient, on-demand network access to a shared set
of configurable computing resources (networks, servers, storage, applications, and services) that
can be rapidly provisioned and released with minimal management effort or interaction with the
service provider [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] . The various computing resources provided by the cloud are called cloud
services. Cloud computing is characterized by:
1) self -service on demand: access to a service by a user is automatic and does not require
interaction with the service provider.
2) Broadband access A network provides access to services. Access is standardized by
heterogeneous clients, whether thin or thick (mobile phones, personal computers, and
workstations).
3) pooling, a provider pools the resources it wishes to make available to its users.
4) elasticity: resources can be provided and reallocated quickly and automatically according to
user demand.
5) pay- as-you-go billing, resource usage is monitored, controlled and reported to users and
providers
The main cloud services are SaaS, IaaS, PaaS
        </p>
        <p>A. SaaS (Software as a Service)</p>
        <p>
          SaaS is the provision by a software provider of a software application to be used and purchased
via the internet [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] . It does not require any installation on customer servers or client devices.
Examples of popular SaaS products are Gmail, Microsoft 365, Shopify, GitHub, Dropbox.
        </p>
        <p>B. IaaS (Infrastructure as Service)</p>
        <p>
          IaaS is a model that allows users to rent and/or purchase computing infrastructure that includes,
depending on the provider, servers, storage, computing power, and networking. For example,
Amazon EC2 offers consumers resources, including CPU, memory, operating system, and storage,
to meet user demands. [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]
        </p>
        <p>C. PaaS (Platform as a Service)</p>
        <p>
          PaaS is a model for developing, running, and managing business applications without having to
build and maintain the infrastructure that such software development processes typically require. It
provides an environment in which developers can build and deploy applications without
necessarily needing to know how much memory and how many processors their application will
use. [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] .
        </p>
        <p>
          The major existing cloud providers are Amazon Web Services (AWS), Microsoft Azure, Google
Cloud Platform (GCP), IBM Cloud and Alibaba Cloud [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] .
2.2.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Cloud monitoring</title>
        <p>
          Cloud monitoring can be described as a set of manual or automated practices, solutions, and
processes that help assess, measure, evaluate, and manage a cloud configuration more efficiently
[
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] . Cloud service monitoring ensures that all cloud-based websites, servers, and networks are
operating optimally while providing analytical insights into risks, vulnerabilities, or capacity
issues. It involves collecting, storing, correlating, displaying metrics, and alarming and responding
[
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] . It includes:
1. website monitoring
2. database monitoring
3. virtual machine monitoring
4. virtual network monitoring
5. security and compliance monitoring.
2.3.
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>Anomaly detection</title>
        <p>
          Anomaly detection is the process of identifying data that deviates from expected patterns in a
dataset. It is widely used in fields such as system monitoring, fraud detection, predictive analytics,
and many others [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] . We distinguish point anomalies (a single abnormal observation within
normal data), contextual anomalies (data is abnormal in a specific context, a single abnormal
observation within normal data), and collective anomalies (a group of points is abnormal, but taken
individually, the points can be normal). Several algorithms are used for anomaly detection in data
monitoring. We distinguish between data-based methods (labeled, unlabeled, semi-labeled) and
time series.
        </p>
        <p>Among the algorithms used, we have: isolation Forest (iForest) clustering (K- Means, DBSCAN)
autoencoders for unlabeled data, i.e. data with no normal or abnormal labels. Among the
algorithms based on labeled data, we distinguish Random Forests, Support Vector Machines (SVM),
convolutional neural networks (CNN) or recurrent neural networks (RNN).</p>
        <p>A time series is a chronological and ordered set of data that shows the evolution over time of a
measurement or value over time. In the case of time series, anomalies are often sudden deviations
that cause either an increase or a decrease in traffic. Among the algorithms usable, we have LSTM
(Long Short-Term Memory), Prophet, SHESD (Seasonal Hybrid Extreme Studentized Deviate).
2.4.</p>
      </sec>
      <sec id="sec-2-4">
        <title>Related works</title>
        <p>
          In recent years, there has been a lot of research on monitoring in a cloud environment.
Researchers, in their quest for an effective solution to monitoring problems, have formulated many
models, designed frameworks, used feasible algorithms and techniques to improve monitoring in a
cloud environment. Farshchi et al. [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] described a regression-based analysis technique to establish
the correlation between the activity logs of an operation and its impact on cloud resources. The
results show a success rate of 92.3% for detecting 115 injected faults. Marques et al. [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] proposes a
framework for a Kubernetes -based cloud, using Prometheus for metrics collection and Grafana for
visualization. This system improves response time and reduces service degradation, while
providing a comprehensive view of application status, allowing malfunctions to be detected and
resource utilization to be optimized during workload variations.
        </p>
        <p>
          Khandelwal et al. [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] worked on a cloud monitoring framework that focuses on metrics such as
available bandwidth and round-trip time between pairs of instances. To create this framework,
various bandwidth and latency estimation tools were combined like Spruce. The proposed
framework exhibits temporary congestions in EC2 instances.
        </p>
        <p>
          Hamamoto et al. [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] propose a cloud-based log analysis environment using Elasticsearch and
Kibana, applied to Moodle (an application written in PHP). The implementation uses Docker
containers and integrates Prometheus for metrics collection and resource monitoring.
The study by Giamattei et al. [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] presents a systematic overview of monitoring tools for
microservices and DevOps, examining 71 tools.
        </p>
        <p>
          The study by Pragathi et al. [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] explores the implementation of a robust monitoring solution using
Prometheus, Grafana, and Node Exporter in a Kubernetes environment. It addresses the challenges
related to infrastructure monitoring and proposes a methodology to overcome them.
Jani 's article [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] describes the implementation of a unified monitoring system for microservices
architectures, highlighting the advantages of Prometheus and Grafana for scalability.
Pedchenko et al. [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] present a comparative study of the main cloud providers. It appears that AWS
is the most used cloud provider with a share of almost 50% of the current market in 2020.
2.5.
        </p>
      </sec>
      <sec id="sec-2-5">
        <title>Analysis of existing work</title>
        <p>
          Farshchi et al. [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] demonstrate that regression analysis can identify defects in cloud resource
monitoring with a high success rate, highlighting the need for more powerful tools. Similarly, the
paper by Khandelwal et al. [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] reveals congestion and latency issues in monitoring EC2 instances.
These studies show that despite AWS's monitoring capabilities (via CloudWatch), problems persist,
particularly in terms of granularity and responsiveness. Alazani et al. [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] also show that
CloudWatch does not allow monitoring of multi-cloud infrastructures and extensive customization
of dashboards.
Marques et al. [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] and the study by Pragathi et al. [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] highlight the integration of Prometheus for
metrics collection and Grafana for visualization in Kubernetes -based environments . These works
highlight that this combination allows to improve the response time, to optimize the use of
resources and to quickly detect malfunctions. The study of Giamattei et al. [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] emphasizes the
effectiveness of Prometheus for the collection of metrics thanks to its HTTP-based scraping model,
its great flexibility in the aggregation and analysis of data thanks to its multidimensional data
model, its powerful query language (PromQL) and its proactive alerting system. This capacity is
particularly relevant for an AWS environment, where services and resources are numerous and
diversified. Yash Jani [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] describes the implementation of a unified monitoring system for
microservices architectures, which allows real-time monitoring of application status and
optimization of scalability. This framework can serve as a model for designing an AWS-specific
system, capable of overcoming the limitations of CloudWatch.
2.6.
        </p>
      </sec>
      <sec id="sec-2-6">
        <title>Prometheus and Grafana</title>
        <p>Prometheus is a powerful open-source monitoring system designed to observe the status of
applications and infrastructure. It operates using a pull-based architecture, where the Prometheus
server collects metric data from predefined targets at regular intervals. These metrics, expressed as
time-series data, are gathered from sources like HTTP endpoints and stored in a dedicated
timeseries database (TSDB).</p>
        <p>The system allows querying data using PromQL, Prometheus's query language, through an
integrated HTTP server interface. Additional components include exporters, which expose metrics
from various services (e.g., databases, web servers), and the Push gateway, which temporarily holds
data from short-lived jobs. Service discovery helps dynamically detect targets, especially in
environments like Kubernetes. Prometheus also supports alerting by generating alerts based on
user-defined rules and forwarding them to Alertmanager, which organizes and routes notifications
through channels such as email or PagerDuty.</p>
        <p>Grafana, often used alongside Prometheus, is an open-source platform for creating interactive
dashboards and visualizing data from multiple sources. It allows users to explore metrics, monitor
trends, and spot anomalies through customizable visual elements like graphs and charts. Grafana
also features alerting mechanisms that can notify users via various communication platforms like
Slack or Microsoft Teams. With its flexible dashboard customization and plugin ecosystem, Grafana
supports real-time collaboration and integrates well with other tools to enhance infrastructure
observability.</p>
        <sec id="sec-2-6-1">
          <title>Materials and methods</title>
        </sec>
      </sec>
      <sec id="sec-2-7">
        <title>Setting up a virtual network</title>
        <p>Here we set up the entire architecture of our network, namely our subnets, our internet gateways,
the routing tables using certain AWS services such as:
IAM: For managing roles and permissions across AWS services. This service allows us to
implement our least-access policy to grant only the permissions strictly necessary to perform their
tasks, and nothing more.
VPC: This service allows us to create an isolated virtual network in AWS. We define our network's
address range, routing tables, access rules, and subnets. The following figure shows the structure of
our architecture
All of this infrastructure is defined and deployed using Terraform, an Infrastructure as Code (Isac)
tool that allows us to manage our configuration in a declarative, versionable, and reproducible way.
Using Terraform, we described the desired state of our infrastructure in configuration files and
automated the deployment of resources.</p>
        <p>Our VPC is configured with a private IP address range ensuring logical separation from other AWS
users. At the moment of physical networks, we can configure routing tables, internet gateways,
firewalls for our network. For our network, we define a range of IP addresses in our private cloud
with the CIDR (Classless Inter-Domain Routing) block. Our range is 10.0.0.0/16 allowing to use all
IP addresses ranging from 10.0.0.0 to 10.0.255.255 for a total number of 65,536 IP addresses. In our
network, we have two types of subnets, public network subnets which host resources accessible
from the internet, while private subnets contain protected internal resources, without direct access
from the outside. Each subnet has its own routing table.</p>
        <p>Terraform modules, allowing us to maintain a consistent configuration and quickly deploy
identical environments if needed.</p>
        <p>We placed our subnets in the us-east-2a and us-east-2b zones respectively. For the private subnets,
a NAT gateway is used to allow the instances to access the internet for updates and other
downloads while remaining inaccessible from the outside.
In addition to the VPC and route tables, we configured two security mechanisms: an AWS Network
ACL (NACL) and an AWS Security Group. The Network ACL allows us to define which types of
traffic are allowed or blocked for instances located in the subnets. The public subnets allow
inbound connections on port 80 for HTTP and 443 for HTTP. Port 22 allows SSH connections to the
instances.</p>
        <p>EC2. All outbound connections are allowed. For private subnets, outbound requests are blocked via
the NAT gateway. The Security Group is a set of firewall rules applied directly to EC2 instances,
unlike NACLs, which apply to entire subnets.
3.2.</p>
      </sec>
      <sec id="sec-2-8">
        <title>Setting up servers</title>
        <p>In our network, we deploy a web server and a file server to serve as services for our network. For
the web server, we used
EC2: This service allows us to manage and launch virtual machine instances. For our server, we
chose a Linux Ubuntu 24.04 machine to run our web server. On this machine, we installed:
Node.js: JavaScript runtime environment with the Express JS framework for developing our API
PostgreSQL: Relational database management system.
The figure above shows the configuration of our EC2 instance. With the node.sh script, we
provision our machine directly.</p>
        <p>S 3: Simple Storage Service (Amazon S3) is a data storage service from AWS that offers
best-inclass scalability, data availability, security, and performance. It allowed us to set up our file server.
To facilitate the configuration and reuse of our infrastructure under AWS, we used Terraform,
which is an infrastructure-as-code tool. It allows us to code our entire cloud configuration in
computer language (HCL) to manage and deploy the cloud resources required for our project in an
automated and structured manner.</p>
      </sec>
      <sec id="sec-2-9">
        <title>Implementation of the monitoring system</title>
        <p>Step monitoring pipeline. First, CloudWatch automatically captures performance data from our
various cloud resources. Then, we use the CloudWatch Exporter for Prometheus, which extracts
these metrics from CloudWatch, converts them to a Prometheus- compatible format, and then
transmits them to our Prometheus server.</p>
        <p>Prometheus server is configured to scrape metrics from three main sources:
●
●
●</p>
        <p>CloudWatch exporter mentioned above
Our web server (via a dedicated exporter)</p>
        <p>Prometheus itself (self-monitoring)</p>
        <p>This entire monitoring infrastructure is hosted on a dedicated EC2 instance within our network,
guaranteeing both security and performance for our monitoring system.
From Figure 5, we have three major sections in our file:
global in this section, we configure the metrics recovery interval (scrape interval) and
reevaluation of the rules</p>
        <p>scrape configs in this section, we define the monitoring targets. Each target is defined with a job
name which is an identifier for the target and a static configs where the addresses of the targets to
be monitored are specified as URLs.</p>
        <p>alerting: we define our Alermanager for alert management.</p>
        <p>2 Creating dashboards</p>
        <p>We build the various dashboards with Grafana using the metrics collected from Prometheus. For
this step, we started by setting up a connection between Grafana and Prometheus by adding
Prometheus as a data source in Grafana. This configuration allows Grafana to query the metrics
collected by Prometheus in real time.</p>
        <p>Once we established this connection, we were able to create custom visualizations that
transformed our raw data into intuitive graphical representations. Each dashboard is designed to
meet specific monitoring needs, with charts, gauges, and tables that present the most relevant
information for our infrastructure.</p>
        <p>PromQL (Prometheus Query Language) queries are used to extract and transform data before
displaying it in Grafana. This approach gives us great flexibility in creating our visualizations,
allowing for aggregations, rate calculations, and comparisons between different metrics.
For anomaly detection, we opted for the SH-ESD model. To do this, we first retrieved the available
metrics on CPU usage via our Prometheus server . After separating these data into different time
series, we applied the ESD algorithm to detect possible outliers. Finally, we plotted these metrics by
marking the different outliers.</p>
        <p>Alert system
To be notified when a threshold is exceeded, we set up an alert system using Prometheus and Alert
manager. Prometheus collects and analyzes metrics, and Alert manager, a separate component,
handles the reception and routing of alerts based on the rules we defined. These alert rules were
fully configured through Alert manager and sends notifications by email.</p>
        <sec id="sec-2-9-1">
          <title>Results and discussions</title>
        </sec>
      </sec>
      <sec id="sec-2-10">
        <title>Results</title>
        <p>This subsection aims to assess the level of interest of the scientific community in this Our AWS
Virtual Private Network has been successfully deployed, spanning an IP address range from 10.0.0.0
to 10.0.255.255 (65,536 IP addresses). The architecture includes four strategically distributed
subnets: two private subnets and two public subnets. This configuration ensures effective
separation between public and private resources while optimizing internet connectivity without
exposing sensitive components.</p>
        <p>The developed API works correctly on our EC2 instance, accessible locally via the address "
http://127.0.0.1:8000 ". Validation of the operation was carried out using Thunder Client,
confirming the availability and responsiveness of the API from the outside via the network's public
IP address (Figure 6).
Analysis of the graphs highlights a significant evolution in the interest that scientists The
performances measured over a one-hour period are presented in the following table:
Performance measured with our solution</p>
        <p>Criteria</p>
        <p>Scraping interval
Reassessment interval
scraping time</p>
        <p>Request latency
Total number of metrics retrieved
Values with our solution
5 seconds
15 seconds
0.212 seconds
0.0021 seconds
Number of targets
scraping interval and re-evaluation interval help maintain a good balance between responsiveness
and system load, avoiding unnecessary overload of our Prometheus server.</p>
        <p>Although the number of targets is limited, these measurements can be extrapolated to assess the
scalability of the system.</p>
        <p>Our SH-ESD model was tested by simulating a one-time high CPU usage of an instance
The results are presented in the following confusion matrix:
Confusion matrix of the SH-ESD model</p>
        <p>Correct value predictions
Correct values
Anomalies
This matrix gives us an overall accuracy of 88.85% over a total of 330 samples, demonstrating the
effectiveness of our anomaly detection system.</p>
        <p>Grafana dashboards, displaying metric variations in real time (Figure 12). These dashboards
provide a clear graphical representation of performance and highlight trends, making it easier to
anticipate potential incidents.</p>
      </sec>
      <sec id="sec-2-11">
        <title>Discussions</title>
        <p>Despite the promising results, our solution has some limitations:
 Latency in metric collection: Using CloudWatch Exporter for Prometheus introduces a
delay that may affect system responsiveness.
 Detection model reliability: The effectiveness of the SH-ESD model strongly depends on
the quality and quantity of training data. The false positive rate could be reduced with
additional adjustments.
 Scalability: While current results are promising, the system could benefit from integration
with other AWS services like EKS for container monitoring or CloudWatch Logs Insights
for deeper log analysis.</p>
        <p>These limitations represent opportunities for improvement for future iterations of the monitoring
system.</p>
        <sec id="sec-2-11-1">
          <title>Conclusion and future work</title>
          <p>During our work, we were able to implement a high-performance monitoring system for an AWS
cloud environment, using the Prometheus and Grafana tools. We were thus able to address the
challenges related to monitoring dematerialized infrastructures by proposing an approach
integrating the collection, analysis and visualization of metrics essential to performance evaluation.
The results obtained demonstrated the effectiveness of the implemented system, both in terms of
reliability and adaptability.</p>
          <p>However, some limitations remain, particularly regarding the improvement of the anomaly
detection model's accuracy. Future work could therefore focus on exploring more advanced
learning algorithms and integrating corrective action automation mechanisms. The work we have
done could be complemented and continued by extending this solution to other cloud platforms
such as Microsoft Azure and Google Cloud Platform, in order to offer a universal monitoring
solution.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used chatGPT-5 mini for the following activities:
language refinement, grammar corrections, and occasional structural suggestions. After using this
tool, the authors reviewed and edited all generated content as needed and take full responsibility
for the publication’s scientific integrity and content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>P.</given-names>
            <surname>Mell</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Grace</surname>
          </string-name>
          , “
          <source>The NIST Definition of Cloud Computing”.</source>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Mr. Armbrust</surname>
          </string-name>
          et al. ,
          <article-title>“Above the Clouds: A Berkeley View of Cloud Computing”</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Huth</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Cebula</surname>
          </string-name>
          , “
          <article-title>The Basics of Cloud Computing”</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Pedchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ivanchenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Ivanchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Lozova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Jancarczyk</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Sawicki</surname>
          </string-name>
          , “
          <article-title>Analysis of modern cloud services to ensure cybersecurity”, Procedia Comput</article-title>
          . Sci. ,
          <source>flight. 207</source>
          , p.
          <fpage>110</fpage>
          -
          <lpage>117</lpage>
          ,
          <year>2022</year>
          , doi : 10.1016/j.procs.
          <year>2022</year>
          .
          <volume>09</volume>
          .043.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Birje</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Bulla</surname>
          </string-name>
          , “
          <article-title>Cloud Monitoring System: A Review</article-title>
          .”
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>[6] Center for Post Graduate Studies</article-title>
          , Visvesvaraya Technological University, Belagavi, Karnataka, India., MN Birje*,
          <string-name>
            <given-names>C.</given-names>
            <surname>Bulla</surname>
          </string-name>
          , and Dept. of CSE, KLE College of Engineering &amp; Technology, Chikodi , Karnataka, India., “Cloud Monitoring System: Basics, Phases and Challenges”,
          <source>Int. J. Recent Technol. Eng. IJRTE</source>
          , vol.
          <volume>8</volume>
          , no .
          <issue>3</issue>
          , p.
          <fpage>4732</fpage>
          -
          <lpage>4736</lpage>
          ,
          <year>Sep 2019</year>
          , doi : 10.35940/ijrte.C6857.098319.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>W.</given-names>
            <surname>Lu</surname>
          </string-name>
          and AA Ghorbani , “
          <article-title>Network Anomaly Detection Based on Wavelet Analysis”</article-title>
          ,
          <string-name>
            <given-names>EURASIP J.</given-names>
            <surname>Adv</surname>
          </string-name>
          . Signal Process. , flight.
          <year>2009</year>
          , no .
          <issue>1</issue>
          , p.
          <fpage>837601</fpage>
          ,
          <string-name>
            <surname>Dec</surname>
          </string-name>
          .
          <year>2008</year>
          , doi : 10.1155/
          <year>2009</year>
          /837601.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Farshchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-G.</given-names>
            <surname>Schneider</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Weber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and J.</given-names>
            <surname>Grundy</surname>
          </string-name>
          , “
          <article-title>Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysis,” in 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE) , Gaithersbury</article-title>
          ,
          <string-name>
            <surname>MD</surname>
          </string-name>
          , USA: IEEE, Nov.
          <year>2015</year>
          , p.
          <fpage>24</fpage>
          -
          <lpage>34</lpage>
          . doi :
          <volume>10</volume>
          .1109/ISSRE.
          <year>2015</year>
          .
          <volume>7381796</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>G.</given-names>
            <surname>Marques</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Senna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sargento</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Carvalho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Pereira</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Matos</surname>
          </string-name>
          , “
          <article-title>Proactive Resource Management for Cloud of Services Environments,” Future Gener</article-title>
          .
          <source>Comput . Syst. , flight. 150</source>
          , p.
          <fpage>90</fpage>
          -
          <lpage>102</lpage>
          , Jan.
          <year>2024</year>
          , doi : 10.1016/j.future.
          <year>2023</year>
          .
          <volume>08</volume>
          .005.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>H.</given-names>
            <surname>Khandelwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. R.</given-names>
            <surname>Kompella</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Ramasubramanian</surname>
          </string-name>
          , “Cloud Monitoring Framework.”
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>N.</given-names>
            <surname>Hamamoto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Yokoyama</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Takefusa</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Aida</surname>
          </string-name>
          , “
          <article-title>Implementation of Secured Log Analysis Environment for Moodle Using Virtual Cloud Provider Service,” Procedia Comput</article-title>
          . Sci. ,
          <source>flight. 192</source>
          , p.
          <fpage>3154</fpage>
          -
          <lpage>3164</lpage>
          ,
          <year>2021</year>
          , doi : 10.1016/j.procs.
          <year>2021</year>
          .
          <volume>09</volume>
          .088.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>L.</given-names>
            <surname>Giamattei</surname>
          </string-name>
          et al. ,
          <article-title>“Monitoring Tools for DevOps and Microservices: A Systematic Gray Literature Review”</article-title>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Syst</surname>
          </string-name>
          . Softw . ,
          <source>flight. 208</source>
          , p.
          <fpage>111906</fpage>
          ,
          <string-name>
            <surname>Feb</surname>
          </string-name>
          .
          <year>2024</year>
          , doi : 10.1016/j.jss.
          <year>2023</year>
          .
          <volume>111906</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>P.</given-names>
            <surname>Bc</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Maddirala</surname>
          </string-name>
          , and S. M, “
          <article-title>Implementing an Effective Infrastructure Monitoring Solution with Prometheus and Grafana,”</article-title>
          <source>Int. J. Comput . Appl</source>
          . , flight.
          <volume>186</volume>
          , no .
          <issue>38</issue>
          , p.
          <fpage>7</fpage>
          -
          <lpage>15</lpage>
          ,
          <year>None 2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Jani</surname>
          </string-name>
          , “
          <article-title>Unified Monitoring for Microservices: Implementing Prometheus and Grafana for Scalable Solutions,”</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Artif</surname>
          </string-name>
          .
          <source>Intellect . Mach. Learn. Data Sci. , flight. 2</source>
          , no .
          <issue>1</issue>
          , p.
          <fpage>848</fpage>
          -
          <lpage>852</lpage>
          ,
          <year>March 2024</year>
          , doi : 10.51219/JAIMLD/ yash-jani /206.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>K.</given-names>
            <surname>Alhamazani</surname>
          </string-name>
          et al. ,
          <article-title>“An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art”</article-title>
          ,
          <source>Computing</source>
          , vol.
          <volume>97</volume>
          , no .
          <issue>4</issue>
          , p.
          <fpage>357</fpage>
          -
          <lpage>377</lpage>
          , Apr.
          <year>2015</year>
          , doi :10.1007/s00607-014-0398-5.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>