Monitoring traffic allows administrators to track and analyze the volume and patterns of incoming requests. This information can help identify any unusual or suspicious activity, such as an unusually high number of requests from a specific IP address, which could indicate a potential security threat. Administrators can proactively respond to and mitigate such threats by closely monitoring the traffic to protect the backend servers and the overall network.
Logging traffic also plays a vital role in identifying and analyzing server responses. By logging the details of each request and response, administrators can gain valuable information about the performance of the backend servers.
More info: Understanding Blackholing