Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
ibis-vega-transform
Advanced tools
A JupyterLab extension for performing Vega transforms lazily using Ibis.
Python evaluation of Vega transforms using Ibis expressions.
For inspiration, see https://github.com/jakevdp/altair-transform
pip install ibis-vega-transform
jupyter labextension install ibis-vega-transform
Then in a notebook, import the Python package and pass in an ibis expression to a Altair chart:
import altair as alt
import ibis_vega_transform
import ibis
import pandas as pd
source = pd.DataFrame({
'a': ['A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I'],
'b': [28, 55, 43, 91, 81, 53, 19, 87, 52]
})
connection = ibis.pandas.connect({'source': source })
table = connection.table('source')
alt.Chart(table).mark_bar().encode(
x='a',
y='b'
)
Check out the notebooks in the ./examples/
directory to see
some options using interactive charts and the OmniSci backend.
Importing ibis_vega_transform
sets the altair
renderer and data transformer to "ibis"
. It also monkeypatches the Ibis chart constructor to handle ibis
expressions.
Now, whenever you pass an ibis
expression to a chart constructor, it will use the custom ibis renderer, which pushes all data aggregates to ibis, instead of in the browser.
You can also set a debug flag, to have it instead pull in the first N rows of the ibis expression and use the default renderer. This is useful to see how the default pipeline would have rendered your chart. If you are getting some error, I reccomend setting this first to see if the error was on the Altair side or on the ibis-vega-transform
side. If the fallback chart rendered correctly, it means the error is in this codebase. If it's wrong, then the error is in your code or in altair or in Vega.
# enable fallback mode
ibis_vega_transform.set_fallback(True)
# disable fallback mode (the default)
ibis_vega_transform.set_fallback(False)
If you want to see traces of the interactiosn for debugging and performance analysis,
install the jaeger-all-in-one
binary and the jupyterlab-server-proxy
lab extension to see the Jaeger icon in the launcher.
conda install jaeger -c conda-forge
jupyter labextension install jupyterlab-server-proxy-saulshanabrook
The Jaeger server won't actually be started until a HTTP request is sent to it,
so before you run your visualization, click the "Jaeger" icon in the JupyterLab launcher or go to
/jaeger
to open the UI. Then run your visualization and you should see the traces appear in Jaeger.
You also will likely have to increase the max UDP packet size on your OS to accomdate for the large logs:
# Edit now
sudo sysctl net.inet.udp.maxdgram=200000
# Edit on restart
echo net.inet.udp.maxdgram=200000 | sudo tee -a /etc/sysctl.conf
To install from source, run the following in a terminal:
git clone git@github.com:Quansight/ibis-vega-transform.git
cd ibis-vega-transform
conda env create -f binder/environment.yml
conda activate ibis-vega-transform
pip install -e ".[dev]"
jlpm
jupyter labextension install . --no-build
jupyter lab --watch
jlpm run watch
A pre-commit hook is installed usig Husky (Git > 2.13 is required!) to format files.
Run the formatting tools at any time using:
black ibis_vega_transform
jlpm run prettier
We are using jupyter-jaeger
to trace each interaction
for benchmarking.
FAQs
A JupyterLab extension for performing Vega transforms lazily using Ibis.
We found that ibis-vega-transform demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.