[Cloud Security][Telemetry][Discussion] Cloudbeat indexing Policy ID in order to track account feature adoption #165211
Replies: 4 comments 2 replies
-
Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security) |
Beta Was this translation helpful? Give feedback.
-
Hey @Omolola-Akinleye, thanks for this great summary. Another option to achieve the same can achieved if cloudbeat will send the relevant data in dedicated fields. ie:
|
Beta Was this translation helpful? Give feedback.
-
Hey @CohenIdo, I like the idea of storing the relevant feature fields. This approach would be certainly easier in extracting the telemetry data. One challenge might be overhead as features are being developed per sprint we would have to coordinate with the Cloudbeat team to store the relevant fields for feature adoption in releases. I like the first approach. How should we define and coordinate that process with Cloudbeat? Also, if an overhead of tracking feature adoption fields, another solution we could get the package policy info via bulk package policy API -
There is still some logic we would have to apply here with this solution. |
Beta Was this translation helpful? Give feedback.
-
@Omolola-Akinleye and @kfirpeled, I am summarizing the decisions we made:
@Omolola-Akinleye, can you confirm if CloudBeat has a task to attach the package policy ID to the findings? If so, we can close this issue. |
Beta Was this translation helpful? Give feedback.
-
Currently, we don’t have the telemetry ability to track feature adoption by account. As of today, the onboarding features such as cloud formation, cloud shell, and single vs organization account are only configured in a package policy.
From the findings index, we can track cloud environment ids( cloud.account.id or orchestrator.cluster.id) and map rule.benchmark.id to
CIS_GCP
,CIS_AWS
,CIS_EKS
,CIS_K8S
.However, since accounts are not connected to the package, we can't capture the following metrics:
Problem:
The findings and vulnerabilities index lacks an efficient connection point to retrieve package policy internal configuration. In the findings/vulnerabilities index. The
agent.id
is indexed; however, for oneagent.id
will entail creating multiple API requests inducing a bottleneck of network requests.Solution:
Below, I have an 8.10 deployment, where we can run tests to investigate the indexes in the current telemetry and also API services such as package policy and agent policy.
Here is an Kibana Env to test runtime mappings per solution and data sources.
Username: elastic
Password
Dev Tools
Beta Was this translation helpful? Give feedback.
All reactions