Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  (Note) Below are the current validation and violation events stored in ES


                      


2. Dashboard Ideas

The visualizations and dashboards will need to be designed and created according to the current and any potential use cases of the POMBA services - what the users want/need to check, how the system could help improve the whole platform integrity. We want the POMBA reporting to be informative, insightful, and intuitive from the user's perspective. 

...

  • We have created a few sample validation rules but do not know all the rules to be created by the users in the production. That means most likely we can create and provide some high-level dashboards - for the specific rules and details, we could only provide some sample dashboards to give an idea so that how the end users could create their own dashboards customized for their use cases. 
  • For the Network Discovery, what specific audits will be executed and what kinds of audit results are expected 


Dashboard List

(Note) One dashboard type could need multiple dashboard pages depending on the amount of visualizations.


Dashboard TypeDescription (What To Want to See)Required Information To Show (Visualizations)
1Overall Audit OverviewMonitorAs a general admin, want to see the whole platform integrity
  • validation total count (for the specified time period)
  • violation total count (for the specified time period)
  • validation count over time (trend)
  • violation count over time (trend)
  • violation count by rule type
  • violation count by rule severity
  • KPI trend: daily violation percentage against validation count (weighted metric considering the severity level)
  • validation
2Individual Audit AnalysisGiven a validation job, the user wants to see all related violations found by POMBA
  • validation details and relevant violation details on the same page
  • (stretch) given the same type of validation job, can we retrieve some historical violation results to give an idea if this is really unusual case or it used to happen?
3


4Violation Analysiswhat kind of violations mostly occur in which components
  • violation stats by validation type
  • violation stats by validation rule
5Violation Analysis for Network Discovery

...