Data Anomaly Policy - Schema

Data Anomaly (profile anomaly) policy

Execution result endpoints for anomaly detection use separate result schemas.

Top-level Fields

Depending on the endpoint, anomaly policy responses carry configuration in one or both of:

FieldTypeDescription
detailsobjectRule-level details including policy items (metrics to monitor, thresholds, etc.).
assetConfigurationobjectAsset-level configuration for anomaly detection (profiling type, schedule, owner/team, pattern settings).
manualProfilingTriggersarrayReasons and flags controlling when manual profiling is required or blocked.

Key nested properties (high-level):

  • details.backingAssetId (integer) – Asset the anomaly policy is configured for.
  • details.items[] – Individual anomaly checks (per metric/column).
  • assetConfiguration.profilingType (string) – Type of profiling (for example distribution, volume, etc.).
  • assetConfiguration.schedule / scheduled (string / boolean) – When anomaly profiling runs.
  • assetConfiguration.notificationChannels (string or object, depending on shape) – High-level alerting configuration.
  • manualProfilingTriggers[].canTrigger (boolean) – Whether manual profiling is allowed.
  • manualProfilingTriggers[].reason (string) – Human-readable reason.
  • manualProfilingTriggers[].type (string) – Trigger type.

Example JSON

JSON
Copy
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard