The Problem We Solve
Data teams face a common challenge: you don’t know what you don’t know.- A column gets dropped upstream → your dbt models fail at 3am
- An ETL job silently stops → dashboards show stale data for hours
- A data type changes → aggregations return wrong results for days
- A new table appears → you find out when someone asks about it
What is Data Observability?
Data observability brings the principles of application monitoring to your data infrastructure. Just as you wouldn’t run a production application without alerts for errors and latency, you shouldn’t run data pipelines without visibility into data health.Key Features
Schema Monitoring
Automatically discover tables and detect schema changes before they break downstream systems. Know immediately when columns are added, removed, or modified.
Freshness Monitoring
Set SLAs on data freshness and get alerted when data is stale or delayed. Never show yesterday’s data on today’s dashboard.
Data Quality Metrics
Track row counts, null percentages, distinct values, and more. Detect anomalies automatically using statistical analysis.
Intelligent Alerts
Route alerts to Slack, email, PagerDuty, or webhooks. Configure rules to filter noise and escalate what matters.
AI-Powered Insights
Get AI-generated documentation for your tables and columns. Ask natural language questions about your data catalog.
Report Badges
Embed data quality status in Databricks, Looker, Notion, and other tools. See pass/fail at a glance.
Who Uses AnomalyArmor?
- Data Engineers
- Analytics Engineers
- Platform Teams
- Data Leaders
Your challenge: Pipelines break when upstream schemas change. You’re the first call when data is wrong.How AnomalyArmor helps:
- Get alerted to schema changes before your pipelines run
- Understand what changed and when
- Reduce time-to-resolution for data incidents
Supported Data Sources
AnomalyArmor connects to your existing data infrastructure with no agents to install:| Data Source | Support Level | Key Features |
|---|---|---|
| PostgreSQL | Full | Tables, views, schemas, constraints |
| Databricks | Full | Unity Catalog, Delta tables, views |
| ClickHouse | Full | Tables, materialized views, dictionaries |
How It Works
AnomalyArmor follows a simple, secure model:- Connect: Add your database with read-only credentials
- Discover: We scan your metadata (never your actual data)
- Monitor: Scheduled scans detect changes automatically
- Alert: Get notified through your preferred channels
How AnomalyArmor Works
Deep dive into the architecture and data flow
Security First
AnomalyArmor is built with security as a foundation:- Metadata only: We never access your actual data
- Encrypted everywhere: TLS 1.3 in transit, AES-256 at rest
- Minimal access: Read-only, dedicated database users recommended
Security Overview
Learn about our security practices and compliance
Getting Started
Ready to try AnomalyArmor? You can be monitoring your first database in under 15 minutes.Quickstart Guide
Step-by-step guide to connect your first database and set up monitoring
Core Concepts
Understand assets, discovery, schema changes, and freshness
Need Help?
Documentation
You’re here! Browse the sidebar for detailed guides.
Support
Contact our team for help with your account.
FAQ
Answers to common questions.
