Skip to main content

Share Public Web Products


The continued growth and expansion of the NIFC AGOL Org has meant that the NIFC AGOL Org has entered a new phase of public publishing. To keep in line with DOI security policies, tighter controls and oversight of public content shared from the NIFC AGOL Org have been created. 
Any user that needs to have non-emergency content shared with the public must fill out the Public Publishing Request Form. The NIFC Data Manager role is the only role that can share content to the public. This is to ensure that on an active incident, emergency and incident related content can be shared with the public without having to go through the form and approval process. Users in the Data Manager role, not on an active incident, must go through the approval process.

Careful consideration must be given to each product shared with the public. Always ensure that public content has been approved by the appropriate party at the unit or on the Incident Management Team (IMT) and does not contain any non-public information.

NIFC Org Public Content Policy

The Public Content Policy and other rules and requirements for NIFC Org content can be found in the NIFC Org Rules of Behavior.

Publicly shared content must serve a current, legitimate business need to provide information to the general public.

Publicly shared feature services shall not have Sync or Edit enabled, relative date queries or extent filters shall not be used in any filter or view definition, and the cache control will be set to 5 Minutes at a minimum.

Rate Limiting

When a database is receives an excessive number of requests, it will cease to respond and begin returning errors to protect the system from being overwhelmed. This is called rate limiting and is generally associated with error number 429.

Rate limiting most often occurs when a public service is not configured properly and is included in a map that goes viral, resulting in a massive amount of demand.

Rate limiting is applied to and affects the entire NIFC Org, not just the service(s) causing it. One popular map can prevent.

If you receive a 429 error, please report it to the NIFC Admins immediately at wildfireresponse@firenet.gov.

Critical Settings

The most important aspect of public data sharing is ensuring that the content can handle the potential load of thousands upon thousands of views.
In 2020, the official public perimeter service received nearly 3 billion hits (that’s billion, with a B).

This scalability is accomplished through the use of a Content Delivery Network (CDN). A CDN uses many geographically distributed servers to cache and deliver the data as opposed to relying on only the one that houses the source database.

Properly configured services hosted in the NIFC Org will leverage the Esri CDN automatically.

There are three primary settings that will affect a service’s ability to use the CDN (i.e., be cached): Edit, Sync, and Cache Control.

Several query types also effect caching: Relative Date/Time and Extent Filters.

Edit

Editing must be disabled on all publicly shared services.

Enabling editing on a public service will allow anyone in the world to modify the data. There are very few cases where this is desirable and should generally be avoided for that reason alone.

However, the pertinent reason here is that editable services do not use the CDN. When enabled, each call will travel all the way to the database to ensure any edits are performed on the current data state (e.g., you would not want to update a feature that someone else deleted several minutes ago).

Sync

Sync must be disabled on all publicly shared services.

The Sync setting allows users to create a replica of the data such as taking a map offline in Field Maps or creating the Offline Copy of the NIFS in ArcGIS Pro.

Like Edit, having Sync enabled will stop the use of the CDN, forcing each query all the way to the database to ensure currency.

Cache Control

The cache control will be set to 5 Minutes at a minimum for any public service.

The Cache Control setting determines how long the CDN will wait before refreshing the information it has cached.

Only set the cache control higher than 5 minutes if the data is not updated or is not time sensitive. Setting the cache control to 1 hour will potentially result in up to a 1-hour delay in updates being seen by end users as the cache waits to refresh.

Relative Time Queries and Extent Filters

Relative date queries or extent filters shall not be used in any filter or view definition.

Relative time queries and extent filters may produce requests that are not cached on the CDN and therefore have the potential to cause rate limiting.

Relative Time
A relative time query is based off a reference to the current date-time. Another way to think of this is as a rolling time frame, such as:

  • FireDiscoveryDateTime is in the last 3 days
  • EditDate is not in the last 2 weeks

Extent Filter
Extent filters are configuration options in certain web apps and dashboards. Most often they are used to produce a count or list of features within the displayed area. Every time a user pans or zooms the map with the extent filter, it sends a request for the data within the displayed area which can quickly add up to a significant load.

There are some scenarios where relative time queries and extent filters can be configured and not affect the database.
High-use apps (state or regional) that need to leverage either relative date queries or extent filters may be approved for use by the NIFC Admins with review. To obtain approval, please contact wildfireresponse@firenet.gov.

Hosted Feature Layer Views

The best way to create cacheable services for public use when the data still needs to be editable by someone is through Hosted Feature Layer Views.

A Hosted Feature Layer View is a new service with independent settings that points back to the same data as its parent service.

This allows the implementation of an internal, editable layer for data management, and a cacheable read-only layer for sharing publicly.

Official Services for Public Use

For some data, optimized layers for public use have already been created and are available on the NIFC Open Data Site.

When wildland fire (point) locations and/or perimeters need to be displayed in public content, the official Open Data Site layers should always be used.

Wildland Fire Locations

Point locations for wildfires, prescribed fires, and complexes sourced from IRWIN.

New Starts - Wildland Fire Incident Locations (Last 24 Hours)

  • Publicly Available  – Open Data Site Link
  • Limited Attributes
  • Features limited to those with a Fire Discovery Date Time within the last 24 hours (see item description for filter details)

Current Wildland Fire Incident Locations

  • Publicly Available – Open Data Site Link 
  • Limited Attributes
  • Features limited to incidents recently edited in IRWIN (see item description for filter details)

2024 Wildland Fire Incident Locations to Date

  • Publicly Available – Open Data Site Link
  • Limited Attributes
  • Features limited to those created on or after January 1, 2024

Wildland Fire Incident Locations

  • Publicly Available – Open Data Site Link 
  • Limited Attributes
  • Includes all valid features in the Wildfire Locations data set. See the item description for details on data sources and filter

Wildland Fire Perimeters

Perimeter services use the best available geometry from ranked sources, primarily the NIFS and the InFORM Final Fire Perimeter service. Source polygon attribution is enriched with the IRWIN fields.

WFIGS Current Interagency Fire Perimeters

  • Publicly Available – Open Data Site Link 
  • Limited Attributes
  • Features limited to incidents recently edited in IRWIN with a publicly available perimeter (see item description for filter details)

WFIGS 2024 Interagency Fire Perimeters to Date 

  • Publicly Available – Open Data Site Link 
  • Limited Attributes
  • Features limited to those created on or after January 1, 2024, with a publicly available perimeter (see item description for filter details)

WFIGS Interagency Fire Perimeters

  • Publicly Available – Open Data Site Link
  • Limited Attributes
  • Includes all features in the Wildfire Perimeters data set with a publicly available perimeter (see item description for filter details)
  • Full History will eventually include additional perimeters loaded from historic data sets.
 

WFIGS Fire History timeline graphic showing the difference between Full History, Year to Date, and Current services.

Additional Resources

 

Modified / Reviewed:

NWCG Latest Announcements

Updated, NWCG Standards for Wildland Fire Module Operations, PMS 430

Date: March 11, 2025
Contact: Fire Use Subcommittee
Wildland Fire Module Unit

The NWCG Standards for Wildland Fire Module Operations, PMS 430 standardizes procedures and expectations for Wildland Fire Modules (WFMs). These standards are to be used by staff, supervisors, specialists, and technicians for planning, administering, and conducting WFM operations. These standards will also be used as a measure of WFM qualifications, capabilities, and expected performance, for both Type 1 and Type 2 WFMs.

References:

NWCG Standards for Wildland Fire Module Operations, PMS 430

NEW! NWCG Standards for Airtanker Operations, PMS 514

Date: March 7, 2025
Contact: National Interagency Aviation Committee

The NWCG Standards for Airtanker Operations, PMS 514 establishes the standards for dispatching, utilizing, and coordinating airtankers on interagency wildland fires. These standards should be used in conjunction with the NWCG Standards for Aerial Supervision (SAS), PMS 505, NWCG Standards for Airtanker Base Operations (SABO), PMS 508, and any applicable agency plans.

References:

NWCG Standards for Airtanker Operations, PMS 514

Incident Position Standards and Next Gen Position Task Books Now Available for Dispatch Incident Positions

Date: March 5, 2025
Contact: National Coordination System Committee

NWCG is excited to announce that Incident Position Standards and Next Generation Position Task Books are now available for all six Dispatch positions:

  • Aircraft Dispatcher
  • Expanded Dispatch Coordinator
  • Expanded Dispatch Recorder
  • Expanded Dispatch Supervisory Dispatcher
  • Expanded Dispatch Support Dispatcher
  • Initial Attack Dispatcher

The Performance Support Packages for these positions, including the Expanded Dispatch Job Aid, J-601 and the Initial Attack and Aircraft Dispatcher Job Aid, J-602, were developed as part of the Incident Performance and Training Modernization (IPTM) effort. These resources support trainees, qualified personnel, and evaluators in their roles.

Any changes to qualification pathways will take effect with the next update of the NWCG Standards for Wildland Fire Position Qualifications, PMS 310-1.

References:

NWCG Aircraft Dispatcher Position Page 

NWCG Expanded Dispatch Coordinator Position Page 

NWCG Expanded Dispatch Recorder Position Page 

NWCG Expanded Dispatch Supervisory Dispatcher Position Page 

NWCG Expanded Dispatch Support Dispatcher Position Page 

NWCG Initial Attack Dispatcher Position Page 

NWCG Job Aids 

Incident Position Standards and the Next Generation Position Task Books Now Available for DMOB, DOCL, and RESL

Date: February 28, 2025
Contact: Incident Operations Subcommittee

NWCG is excited to announce that Incident Position Standards and the Next Generation Position Task Books are now available for Demobilization Unit Leader (DMOB), Documentation Unit Leader (DOCL), and Resources Unit Leader (RESL).

The Performance Support Packages for these positions, including a job aid for RESL, were developed as part of the Incident Performance and Training Modernization (IPTM) effort. These resources support trainees, qualified personnel, and evaluators in their respective roles.

Any changes to qualification pathways will take effect with the next update of the NWCG Standards for Wildland Fire Position Qualifications, PMS 310-1.

References:

NWCG Demobilization Unit Leader Position Page 

NWCG Documentation Unit Leader Position Page 

NWCG Resources Unit Leader Position Page