K3 Documents

K3 Components

Updated Jul 17, 2020

The components below enable K3 users to flow data between external systems and transform that data along the way.

Additional details and examples for setting up Routes that use a variety of adaptors can be found here: Adaptors


Route Config

Select and configure adaptors that can connect to a diverse set of external systems and endpoints to acquire SOURCE data (input) and deliver TARGET data (output).

Data Stream

View, manage, filter, and sort data as it is received and transformed by K3.


Define the fields for your SOURCE data schema - or let K3 suggest fields using a data sample. Then, define the fields that will represent your TARGET data schema.


Create relationships between SOURCE and TARGET fields that propagate  data from your source system to your target system. Translate data source values that need to be re-defined before your data is sent to the target system.


Use conditional statements to enrich, transform, and validate data, after mappings have been applied and before data is sent to the target system. Rules enable you to write Java statements using the core Java utilities.


The Reporting page is where you can download files with direct access to data in the K3 tables for reporting outside of the Data Stream

Download as SQL

Download a SQL script that queries all fields from the K3 TARGET fields.

Download TDS

Download a TDS (Tableau Data Source) file that can be launched using a Tableau instance to query all fields from the K3 TARGET fields


The Admin Console page is where administrators create and modify Users and their permissions (which are governed by Security Groups) and review changes to ROUTE components. 

Audit Trail

Displays changes made by users to Mappings, Rules, Users, and system reference data.


Users are created from this screen and assigned one or more Security Groups which govern the User's permissions.

Security Groups

Security Groups consist of a collection of permission Roles that apply to a collection of Routes.


These are static permissions that dictate what actions can be undertaken in the system.

Previous Article K3 Overview
Next Article K3 Architecture