C-Level Performance Operating System

KPI Enterprise Mining

Discover KPI systems from raw sources, govern definitions, trace driver trees, explain anomalies and turn evidence-backed insight into owned action. The product is designed for sovereign DGX/on-prem operation with tenant isolation, local-first models and audited agent execution.

KPI discovery Metric governance Driver trees RCA agents Audit trail
What changed?

Revenue quality improved, gross margin risk moved to customer cohorts, and cash conversion needs owner action.

Why?

Price leakage, delayed onboarding and supplier variance explain most of the movement with linked evidence.

What now?

Assign actions, approve agent workflows and track expected EBITDA and liquidity impact.

Executive Loop

Each briefing follows the same operating sequence: detect, explain, decide, assign, verify and archive evidence.

Daily briefing Weekly steering Board pack

Metric Store

Metric contracts define formula, grain, owner, source lineage, sensitivity and reconciliation tests before metrics become decision-grade.

Formula versioning Golden datasets Lineage

Action Control

Agents can recommend measures, but tenant policy controls model route, approval gates, external tool use and rollback evidence.

HITL approvals Owner SLA Audit namespace

Data Plane

1

Ingest

Airbyte, Nimble, Crawl4AI, uploads and partner APIs land in tenant-scoped bronze storage.

source
2

Normalize

dbt and data contracts promote bronze to silver and gold with reconciliation checks.

contract
3

Serve

ClickHouse stores events and KPI time series; OpenSearch and Qdrant power hybrid evidence search.

serve

Agent Plane

AgentRoleGuard
KPI MinerFinds candidate metrics and maps them to source columns.tenant scoped
Driver-Tree AgentBuilds and tests causal KPI trees.evidence required
Anomaly/RCA AgentExplains deviations and links supporting artifacts.replayable
C-Level Briefing AgentWrites board-ready summaries with owner actions.approval gate
Compliance/Audit AgentChecks trace completeness, model route and policy.deny by default

Tenant Isolation Release Gate

A

Identity and policy

Keycloak roles, tenant ID on every event, tenant-local LiteLLM virtual keys and model policy per sensitivity class.

rbac
B

Storage boundaries

Separate bucket prefixes, schemas, indices and vector namespaces; negative tests deny cross-tenant reads.

data
C

Audit evidence

Langfuse trace, ClickHouse events, prompt version, evalset ID, approval and rollback artifact are written per run.

audit

Route Contract

/ serves the operating cockpit.

/enterprise serves this enterprise readiness map.

/api/v1/* serves static fallback JSON or proxies to agents-orchestrator.

/openapi.json documents the public v1 surface.