当前位置:网站首页>Maintain the visibility of data automation: logging, auditing and error handling of the bridge of knowledge and action
Maintain the visibility of data automation: logging, auditing and error handling of the bridge of knowledge and action
2022-06-24 03:52:00 【Knowledge and action software EDI】
The bridge of knowledge and action workflow automation solution requires almost no active maintenance , Because it will always run smoothly in the background . Although convenient , But there may also be a worrying problem : Since daily intervention is no longer required , Whether the enterprise will lose the visual control over the data ? What if something goes wrong and nobody notices it ?
The bridge of knowledge and action solves these problems through a series of visibility functions , Ensure that the data is completely transparent in the automated process . Maintaining visibility into data enables organizations to generate meaningful reports , Or conduct an audit 、 Respond to handling faults , And ensure that the data processing can still be controlled by manual operation after problems occur in the automation process .
Why visibility is so important ?
In addition to focusing on data flow , The following specific reasons also require a high degree of visibility from automation solutions :
- Generate audits and reports to cross check and understand data processing
- Non repudiation of trading partners
- Respond intelligently to errors and faults
This article discusses the above challenges and features in the data processing platform , To ensure that visibility is not a problem for users .
Audit and reporting
Auditing and reporting help ensure that data is properly managed and processed . In the data automation platform , Auditing can have two different meanings : Audit transactions handled by the application ( for example , Generate an audit for data sent by a particular trading partner ), And the audit automation platform itself .
Transaction audit
A transaction audit provides a record of the data processed by an automated workflow . These audits can be cross checked with external records , To ensure that all parties ( For example, trading partners ) Agree on the correct handling of key data sets .
Generating an accurate transaction audit requires the ability to filter out unrelated transactions . Highlight specific transactions that are associated within a specified time frame ( for example , From the same trading partner ) Helps ensure that no data is missed or mishandled .
Platform audit
It is also necessary to change the configuration of the audit data automation platform . These audits help resolve errors and failures after configuration changes , In order to prepare for configuration rollback or better understand and debug problems .
Platform audits require that automated platforms have user scenarios that link configuration changes to specific users .
Non repudiation
Non repudiation means to ensure that the trading partner will not transmit correctly to your organization 、 Objection to receiving or otherwise processing their data . In rare cases where important data are missing , Non repudiation helps protect organizations from potential liability .
Automation solutions need to be able to provide external parties with evidence that their data has been sent or received correctly .
Errors and alerts
System administrators need to be able to understand and react to failures that occur during data processing . The most common form of error response is in the form of an alarm —— Whenever there is a problem with the automated workflow , Administrators receive alerts via email or text .
More complex error responses help reduce the burden on system administrators to monitor and respond to alerts , And it can be designed to solve or eliminate the emergency situation that may be caused by processing failure . Error response and alerts work together to ensure that there is no risk in automating day-to-day data management tasks .
How does the bridge of knowledge and action maintain data visibility
The bridge of knowledge and action is designed to keep data visible even in automated workflows . The bridge of knowledge and action supports intelligent audit through a set of enterprise functions detailed below 、 Non repudiation and error management .
Auditing in the bridge of knowledge and action
The bridge of knowledge and action simplifies the process of transaction audit and platform audit . The transaction log in the bridge of knowledge and action provides searchable transaction records , Use the metadata associated with each transaction to ensure that similar transactions can always be grouped together through simple search terms in the transaction log . Besides , The bridge of knowledge and action supports adding custom metadata to transactions , To maintain fine control over how transactions are grouped .
The bridge of knowledge and action also provides a convenient audit log , Facilitate platform audit . Each knowledge and action bridge user is associated with the changes they make in the application , So that managers and other team members can trace the use of users when necessary . Combined with the role system , Make sure that users do not exceed the access rights they need , This helps restore the configuration from .
The automatic non repudiation of the bridge of knowing and doing
The bridge of knowledge and practice will automatically generate and request receipts when exchanging data with trading partners ( for example MDN). Before the bridge of knowledge and action marks the transaction as successful , Receipt from the other party is required . let me put it another way , The bridge of knowledge and action does not allow the possibility of data being processed but not confirmed , Because this will lead to the most risky mistake .
Since the receipt is part of the transaction itself , therefore Users of the bridge of knowledge and action do not need to assume any further responsibility to ensure non repudiation .
Configure alerts and custom error responses in the bridge of knowledge and action
The bridge of knowledge and action supports global alerts and specific custom error responses . Global alerts only need to specify an e-mail address for the appropriate system administrator , To ensure that data processing failures are never ignored .
The custom workflow of the bridge of knowledge and action also supports the intelligent processing of specific errors —— When an error occurs during processing , Each element in the automated data pipeline can invoke a custom workflow . therefore , System administrators can make full use of the flexibility of the knowledge and action bridge workflow to configure their own error handling logic .
Combine , The error handling function of the bridge of knowledge and action ensures that administrators can solve data processing errors through personal intervention or intelligent automatic error recovery .
notes : Some of the pictures and contents of the copywriting are from the Internet , The copyright belongs to the original author , If it infringes upon your rights and interests , Please contact us to delete , It's bothering you , We are deeply sorry .
边栏推荐
- Several key tools for cloud native implementation
- Grp: how to add Prometheus monitoring in GRP service?
- Prometheus PushGateway 碎碎念
- 【代码随想录-动态规划】T392.判断子序列
- [Tencent cloud update] against 11.11! Here comes the 1.1% discount for enterprises!
- web渗透测试----5、暴力破解漏洞--(7)MYSQL密码破解
- Browser rendering mechanism
- halcon知识:区域(Region)上的轮廓算子(2)
- Web penetration test - 5. Brute force cracking vulnerability - (1) SSH password cracking
- What technology does cloud computing elasticity scale? What are the advantages of elastic scaling in cloud computing?
猜你喜欢

ModStartCMS 企业内容建站系统(支持 Laravel9)v4.2.0

Black hat SEO actual combat directory wheel chain generates millions of pages in batch

Installation of pytorch in pycharm

SQL注入绕过安全狗思路一

Koom of memory leak

内存泄漏之KOOM
![[code Capriccio - dynamic planning] t392 Judgement subsequence](/img/59/9da6d70195ce64b70ada8687a07488.png)
[code Capriccio - dynamic planning] t392 Judgement subsequence

黑帽SEO实战之目录轮链批量生成百万页面

Black hat actual combat SEO: never be found hijacking
Thank you for your recognition! One thank-you note after another
随机推荐
web渗透测试----5、暴力破解漏洞--(4)Telnet密码破解
ClickHouse(02)ClickHouse架构设计介绍概述与ClickHouse数据分片设计
Modstartcms enterprise content site building system (supporting laravel9) v4.2.0
ClickHouse Buffer
内存泄漏之KOOM-Shark中的Hprof信息
golang clean a slice
Web penetration test - 5. Brute force cracking vulnerability - (4) telnet password cracking
How to select the application of the server?
How to use elastic scaling in cloud computing? What are the functions?
halcon知识:区域(Region)上的轮廓算子(2)
Does the user need a code signing certificate? What is the use of a code signing certificate
ModStartCMS 企业内容建站系统(支持 Laravel9)v4.2.0
Paste board based on curl and COS
Installation of pytorch in pycharm
Several key tools for cloud native implementation
How to avoid man in the middle attack (mitm)
Garbage collection mechanism
NLP task summary introduction and understanding
web渗透测试----5、暴力破解漏洞--(7)MYSQL密码破解
Grpc: how to add API log interceptors / Middleware?