Apache Superset
Apache Superset is a modern, enterprise-ready business intelligence web application. It is fast, lightweight, intuitive, and loaded with options that make it easy for users of all skill sets to explore and visualize their data, from simple pie charts to highly detailed deck.gl geospatial charts
Features
- Fully customisable dashboards
- Can run SQL on any dataset hooked up
- No coding required. UI is feature rich and straightforward
- Lightweight and scaleable - Hooks to existing infrastructure
- API for low level customisation
- Security that can be coupled with almost anything
- Users and roles lets you decide who sees what
- Notification Alerts
- Scheduled reports
- Seamless, in-memory asynchronous caching and queries
Benefits
- View dashboards anywhere, anytime
- Get reports sent to your device
- REST API Access
- Easy integration with your existing data sources and pipelines
- Deploy in AWS/GCP/Azure, hybrid clouds, Kubernetes, and bare metal
Pricing
£700 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 2 9 2 7 3 4 5 8 0 0 6 1 2 2
Contact
Millersoft Ltd
Gerry Conaghan
Telephone: 0131 376 7114
Email: gerry@millersoftltd.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Druid and Pinot
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
-
Needs to be hooked up to existing data sources.
Cost efficient when bought with our other services -Druid and Pinot. - System requirements
- Linux
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Depends on SLA, normally within 4 hours
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
L1: Tier/Level 1(T1/L1)
Initial support level responsible for basic customer issues. Gathering formation to
determine the issue by analysing the symptoms and figuring out the underlying problem.
L2: Tier/Level 2(T2/L2)
This is a more in-depth technical support level than Tier I containing experienced and more
knowledgeable personnel on a particular product or service.
L3 Tier/Level 3(T3/L3)
Individuals are experts in their fields and are responsible for not only assisting both Tier I and
Tier II personnel, but with the research and development of solutions to new or unknown
issues.
Severity Definitions
1- Critical: Proven Error of the Product in a production environment. The Product Software
is unusable, resulting in a critical impact on the operation. No workaround is available.
2- Serious: The Product will operate but due to an Error, its operation is severely restricted.
No workaround is available.
3- Moderate: The Product will operate with limitations due to an Error that is not critical to
the overall operation. For example, a workaround forces a user and/or a systems
operator to use a time consuming procedure to operate the system; or removes a nonessential
feature.
4- Due to an Error, the Product can be used with only slight inconvenience. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Core Superset consultancy
Superset installation and configuration
Superset tuning
Superset testing
Kafka installation and configuration
Supset installation and configuration
Security installation and configuration
Documentation and Training Videos https://superset.apache.org/docs/intro/ - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- All data resides inside the customers cloud/onprem account.
- End-of-contract process
- Support, upgrades and maintenance will end.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Superset is shipped with a comprehensive API that can do high and low level tasks.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
We can accommodate and support custom configuration requests.
User access, roles and authentication are fully configurable.
Superset can be customised to provide a look and feel for your business.
Additional sources can be added.
Scaling
- Independence of resources
- Setting up infrastructure based on the volume of data from source systems.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Superset generates metrics related to queries and dashboards.
Metrics are emitted as JSON objects to a runtime log file or over HTTP (to a service such as Apache Kafka). Metric emission is disabled by default.
All Superset metrics share a common set of fields:
timestamp - the time the metric was created
metric - the name of the metric
service - the service name that emitted the metric
host - the host name that emitted the metric
value - some numeric value associated with the metric
Metrics may have additional dimensions beyond those listed above. - Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Never
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Various export utils via command line and JDBC
- Data export formats
-
- CSV
- Other
- Other data export formats
- Json
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Kafka
- AWS S3
- Networked Drive
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection between networks
- Can also encrypt prior to transfer
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Customer dependent.
- Approach to resilience
- AWS services are delivered from multiple datacentres worldwide. When deploying customer services to AWS, Superset can be configured such that services span multiple availability zones (data centres) to ensure service resilience. Alternatively, our Disaster Recovery as a Service offer can be used to provide DR.
- Outage reporting
- AWS Cloudwatch alerts can be created
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Access to management interfaces and support channels is restricted through a combination of username and passwords, multifactor authentication, firewalling, IP restrictions, the use of bastion hosts as appropriate.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
- Millersoft Druid service follows AWS best practice on security https://aws.amazon.com/security/. We have a range of technical and organisational measures to ensure data security and protection. These cover Access, Roles and Responsibilities, Resource/asset management, Access Control & Authentication, Workstation & Device Security, Network/Communications Security, Back-up, mobile/portable device security, and physical security of our premises. Staff training and awareness is ongoing, staff / contractors must sign confidentiality and privacy statements and read and sign company security policy. Sanctions are applicable for non-compliance. Our reporting structure if a security breach happens or is suspected: staff are trained to and required to immediately flag to DPO and CEO and lock down or isolate the breach where feasible; DPO/CEO will take immediate action including isolation or lock down of affected systems, notification to affected parties, implementation of business continuity and disaster recovery. Risk impact reviews are conducted when a new data category is processed, or system implemented, and security measures adapted as necessary. Category logs, training logs, access logs, and breach logs are maintained, reviewed and signed off periodically by the assigned DPO and CEO.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All code is under version control using git
Jenkins is used to build releases
An automated test framework is used for integration testing
Changes are tracked via jira
Cloudformation is used to deploy via AWS Marketplace - Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
Solution is deployed into customer's AWS VPC via AWS Cloudformation
External access is configured via customer and GUI is locked down via AWS security groups
SSH access is also locked down via security group and PEM file.
The access is as secure as the customers network.
Patches are in the form of new AWS AMIs - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- All logs go to AWS Cloudwatch for auditing, monitoring and alerting
- Incident management type
- Supplier-defined controls
- Incident management approach
- Each instance runs within a VPC within the customers AWS Account. There is no external access or monitoring. Issues need to be reported to the supplier and logs supplied for external analysis.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Tackling economic inequalityTackling economic inequality
We believe that our social mission to assist young people into employment is compatible with the guidelines laid out in the Governments Social Value theme of tacking economic inequality (MAC 2.2). Wherever it has the opportunity to do so, Millersoft has and continues to offer placements, internships and employment to technology students from the deprived local area studying in local colleges and universities with whom we hold relations. Our method is to provide initial training and inductions to suitable internees before assigning them to live projects, where they are monitored, supported, challenged, and encouraged by experienced senior consultants and developers. As an organisation that values fresh and radical ideas to find new products and solutions to solve existing problems, internees are also encouraged to share their thoughts and ideas in a stimulating and collaborative environment, and often asked to implement, test and deploy them into real world projects. Regular development reviews are held with internees and progress objectives adapted accordingly. Internees, as is the case with all staff, receive regular training in the latest technologies which may cover Cloud Technologies (staff are trained to be Amazon Web Service Engineers and Architects), data processing tools, database management, project management, security. In most cases internees become full time employees at Millersoft once they graduate and are already well equipped to take on more responsibility and autonomy within the company.
Pricing
- Price
- £700 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No