DataSpace

An approachable data Transformation, Analysis
and Lineage platform.

Data Transformation

Transform your data with ease

The system is flexible and allows for any python-based transformation library to be used such as pandas, pyspark or polars. The transformation results are stored as parquet files.

DataSpace code editor showing Python data transformation interface
Data Analysis

Quickly gain insights into your data

The platform employs performant data querying technologies in order to retrieve the desired data previews. Furthermore, interactive plots can be generated to visually analyse the data.


Statistics

Built in min/max value, unique count and null value distribution per column. Learn more

Plots

Generate interactive plots with native python tools. Learn more

Data Lineage

Explore your pipeline at once glance

DataSpace analyses the source code of individual transformations and is therefore able to generate a lineage in real-time.

Powerful Core Features

Flexible Output Creation

Leverage the power of Python transformations to create rich visualizations, comprehensive reports, and automated notifications from your data pipeline.

Plots and Dashboards

Create interactive visualizations and dashboards using any Python plotting library. Generate HTML files with Plotly, Matplotlib, or handcrafted visualizations that are automatically served by the platform. Learn more

Reports

Generate comprehensive reports in any format from your transformed data. Use Python's rich ecosystem to create PDFs, HTML reports, Excel files, or custom document formats that suit your workflow needs.

Notifications

Build custom notification transformations that trigger alerts based on your data. Send messages to Slack, Telegram, or any external service when your data meets specific conditions or thresholds. Learn more

DataSpace secure architecture infrastructure diagram
Secure Architecture

Robust data protection model

DataSpace prioritizes the security of your sensitive data. With self-hostable components and robust access controls, you can ensure that your information never leaves your dedicated environment.


  • Self-hostable components for complete control
  • Granular access controls and user roles
  • End-to-end encryption for data in transit