Patent attributes
Some embodiments process log data into traffic patterns, using call graph normalization and aggregation. Traffic patterns are characterized, by comparing traffic patterns, finding redundancies, locating coverage gaps, delimiting impact regions, spotting optimization candidates, performing timing analyses, predicting traffic flow, or other operations. Characterizations are prioritized, and priorities help guide operational changes in a computing system. Gaps between the traffic patterns of different environments or different scenarios may be located, leading to changes in signoff coverage or testing coverage or both. Deployment traffic anomalies may trigger rollback. Traffic patterns indicative of cyberattacks may trigger security countermeasures.