Why a Dashboard?
In the YaST team we use quite a lot of external or internal services like GitHub, Travis, Jenkins, Open Build Service, Bugzilla, Trello,... It is too difficult and time consuming to track all those tools and get an overview what is OK, what failed and what actions should we take to resolve the problems.
Ideally there should be a tool which collects the status from all services and provides a summary page with all relevant information at one place.
Additionally it should not only report the found problems but also propose a solution so non-expert developers have a hint what needs to be fixed and how (if possible).
Generic Dashboard
The goal is to have the dashboard generic so the other teams could easily change the used services and their parameters (like which users to watch in bugzilla) and reuse the tool without much effort. This could also enable the cooperation with the other teams and increase the amount of possible developers for the project.
The Prototype
There already exists a prototype application, deployed here (this public instance does not contain any credentials, it can only see the publicly available services and their publicly available data, i.e. no internal bug reports).
Features
- Ruby on Rails application with Postgres DB and nginx web server (in the production mode)
- Includes a Docker configuration for easy development/deployment
- The UI is based on the Gentellela template
- Includes a simple Jenkins log analyzer which proposes solutions for known error patterns (live page)
- See more details in the README
TODO
- Collect the requirements for this service
- Collect the list of services which we should watch
- For each service collect which attributes or values which are important to track
- The UI Design
- How to present the data at the summary page?
- How to make it easily readable?
- How to easily recognize the required actions?
- Add more status analyzers to propose actions for the other services
- Make the application easily configurable
- Think how to pass and store the sensitive data (passwords, access tokens) securely
=================================================================================
No Hackers yet
Looking for hackers with the skills:
This project is part of:
Hack Week 16
Activity
Comments
Be the first to comment!
Similar Projects
Validate the embargo date OBS attribute by enavarro_suse
Project Description
The issue is describe...
YaST log grouping, better visualization of the log by lslezak
Description
TL;DR: I'd like to have som...
WebRTC individual track recorder by avicenzi
[comment]: # (Please use the project descriptio...
Weekly balanced family menu planner (learn JS, Node.JS, React, MongoDB) by pherranz
Project Description
We're always struggling...
Improve the UX/UI of User Story by cyntss
Project Description
User Story is an open...
Adopt Typescript in D-Installer by IGonzalezSosa
Project Description
In January, we announ...
Port the Minion job queue to TypeScript by kraih
Project Description
As part of the [mojo....
YaST log grouping, better visualization of the log by lslezak
Description
TL;DR: I'd like to have som...
Improve SLE Release Management Container by suntorytimed
Project Description
In this project I would...
Validate the embargo date OBS attribute by enavarro_suse
Project Description
The issue is describe...
Package docker compose v2 by hennevogel
Package [compose](https://github.com/docker/com...
Uyuni/SUSE Manager Server Helm chart on k3s by moio
![Combined icons of k3s and Uyuni](https://user...
Migrate suntorytimed/resourcespace container to an openSUSE base by suntorytimed
Project Description
For quite some time I a...
Improve SLE Release Management Container by suntorytimed
Project Description
In this project I would...