feat(web-ng): topo map improvements #1061
Labels
No labels
1week
2weeks
Failed compliance check
IP cameras
NATS
Possible security concern
Review effort 1/5
Review effort 2/5
Review effort 3/5
Review effort 4/5
Review effort 5/5
UI
aardvark
accessibility
amd64
api
arm64
auth
back-end
bgp
blog
bug
build
checkers
ci-cd
cleanup
cnpg
codex
core
dependencies
device-management
documentation
duplicate
dusk
ebpf
enhancement
eta 1d
eta 1hr
eta 3d
eta 3hr
feature
fieldsurvey
github_actions
go
good first issue
help wanted
invalid
javascript
k8s
log-collector
mapper
mtr
needs-triage
netflow
network-sweep
observability
oracle
otel
plug-in
proton
python
question
reddit
redhat
research
rperf
rperf-checker
rust
sdk
security
serviceradar-agent
serviceradar-agent-gateway
serviceradar-web
serviceradar-web-ng
siem
snmp
sysmon
topology
ubiquiti
wasm
wontfix
zen-engine
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
carverauto/serviceradar#1061
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Imported from GitHub.
Original GitHub issue: #2912
Original author: @mfreeman451
Original URL: https://github.com/carverauto/serviceradar/issues/2912
Original created: 2026-02-25T12:53:08Z
PRD: Unified Topology Investigation Surface
Product: ServiceRadar
Author: Carver Automation Corporation
Status: Draft
Created: 2025-02-25
Rendering Stack: deck.gl / luma.gl
1. Problem Statement
Network operators and SOC analysts are forced to context-switch between siloed tools — NMS platforms for device health and topology, SIEM consoles for security events, flow analyzers for traffic forensics, and vulnerability scanners for posture assessment. During an active incident, this fragmentation costs critical minutes as analysts manually correlate data across systems to answer fundamental questions:
ServiceRadar already ingests the signals needed to answer these questions — NetFlow, SNMP, syslog, BGP/BMP, threat feeds (AlienVault OTX), Falco/Trivy, and GeoIP/ASN enrichment. The topology surface already renders device relationships using deck.gl. The opportunity is to fuse these signals into a single, high-performance visual investigation plane where the topology graph becomes the primary entry point for both network troubleshooting and security investigation.
2. Vision
The ServiceRadar Topology Surface becomes a unified investigation canvas — the place where a network operator troubleshooting a routing issue and a SOC analyst investigating lateral movement both start their work. Every node on the graph is a portal to correlated, multi-signal context. Every edge encodes real-time network state. The graph itself becomes a living anomaly map that surfaces problems before analysts go looking for them.
3. Goals & Success Metrics
4. User Personas
Network Operator (NetOps)
Responsible for uptime, performance, and troubleshooting. Cares about link utilization, device health, routing state, and traffic patterns. Needs to quickly answer: "What changed and where is the bottleneck?"
SOC Analyst
Responsible for threat detection, investigation, and response. Cares about anomalous communications, known-bad IPs, vulnerability exposure, and lateral movement. Needs to quickly answer: "What is the blast radius and how did the attacker move?"
Network Security Engineer
Straddles both worlds. Maintains firewall policies, segments networks, monitors for policy violations. Needs the topology to show both logical security boundaries and the traffic that crosses them.
5. Feature Specifications
5.1 NetFlow Conversation Arcs (ArcLayer)
Trigger: User clicks a node, or a threat-correlated flow is detected.
Behavior:
deck.gl ArcLayerfrom the selected node to every peer it communicated with.Visual Encoding:
Interaction:
Performance Guard: NetFlow arcs render only for the selected node or for threat-correlated flows. Global "show all flows" is intentionally omitted to prevent visual overload (the "hairball" problem). Use deck.gl Composite Layers to keep the arc layer separate and conditionally instantiated.
5.2 External Traffic & GeoIP Orbit
Problem: NetFlow conversations with external IPs have no node on the LAN topology to terminate at.
Solution: Generate a dynamic external orbit — a ring of clustered nodes positioned along the periphery of the viewport, grouped by ASN or geographic region.
Behavior:
Future Extension: Toggle to a globe/map view (deck.gl
GlobeView) where external arcs land on geographic coordinates, using GeoIP enrichment for placement.5.3 Threat & Vulnerability Overlays
These overlays transform the topology from a network diagram into a security posture map.
5.3.1 Threat Feed Correlation (AlienVault OTX)
PathLayerwith a neon red/orange glow (luma.gl bloom post-processing) tracing the traffic path through intermediate switches/routers.5.3.2 Falco / Trivy Badges
5.3.3 SNMP Trap & Syslog Indicators
5.4 SNMP Metric Encoding on Edges
Replace static topology edges with data-driven visual links reflecting real-time interface metrics.
Link Saturation Color Ramp:
Particle Encoding:
Link State:
5.5 Temporal Investigation ("Time-Travel DVR")
Purpose: Enable analysts to answer "What was the network doing at time X?"
UI Element: A timeline scrubber bar at the bottom of the topology surface.
Behavior:
Data Source: TimescaleDB continuous aggregates for SNMP metrics; NetFlow stored in time-bucketed hypertables; event timestamps from syslog/Falco/traps.
5.6 Topology View Modes
Provide toggleable views to let analysts switch the lens through which they see the network.
BGP-Specific Behaviors:
5.7 Unified Context Panel
Trigger: Click any node or edge on the topology.
Layout: Slide-out drawer from the right side of the viewport (does not obscure the topology; topology shifts left).
Content — Node Selected:
Content — Edge Selected:
5.8 Investigation Mode
A dedicated workflow for active incident response and threat hunting.
5.8.1 Right-Click → Investigate
5.8.2 Path Trace
5.8.3 SRQL Integration
/) allows analysts to type SRQL queries that filter and highlight the topology.flows where dst_asn = 'AS1234' and bytes > 1GB last 24h— highlights all nodes involved in matching flows, renders arcs.events where severity = 'critical' last 6h— pulses all nodes with matching events.devices where trivy_critical > 0— highlights vulnerable hosts.5.8.4 Anomaly Overlays
5.9 Anti-Hairball Rendering Strategy
At scale (50,000+ nodes), visual clarity is paramount. The following strategies prevent the topology from becoming an unreadable mess.
6. Data Flow Architecture
7. Implementation Phases
Phase 1 — Foundation (NetFlow Arcs + Context Panel)
Phase 2 — Security Overlays
Phase 3 — Temporal & Investigation
Phase 4 — Intelligence & Scale
8. Open Questions
TripsLayer(built-in) or custom luma.gl shaders?9. Competitive Differentiation
Most NMS tools (LibreNMS, Zabbix, PRTG) render topology with link utilization overlays but have no security signal integration. Most SIEMs (Splunk, Elastic SIEM, Wazuh) present log events in tables and timelines but have no network topology awareness. The small number of tools that attempt both (SolarWinds, Cisco DNA Center) are proprietary, expensive, and architecturally siloed internally.
ServiceRadar's approach — a single deck.gl-powered canvas that spatially correlates network state, traffic flows, and security signals — is architecturally novel in the open-source space. The combination of SRQL as a query language, MCP for AI-assisted triage, and the real-time rendering performance of deck.gl/luma.gl positions ServiceRadar to be the first open-source platform that genuinely unifies NMS and SIEM investigation workflows on a shared visual surface.
Imported GitHub comment.
Original author: @mfreeman451
Original URL: https://github.com/carverauto/serviceradar/issues/2912#issuecomment-3964264052
Original created: 2026-02-26T05:47:43Z
https://deck.gl/docs/api-reference/widgets/timeline-widget