New query builder in the Insights module
From questions about cloud infrastructure to clarity and control
Cloud Advisor stores data about all resources, their properties and dependencies in a single graph database. This helps IT and security teams instantly get answers to any questions about the current state of the infrastructure. Previously, to find the necessary information, you had to write queries in GraphQL yourself, which was a barrier for many specialists. We have addressed this limitation with a new no-code tool.
Now you can create queries containing various combinations of conditions to search for the resources you need without developing code, using an intuitive interface. For complex expert tasks, we have retained full access to GraphQL.
Cloud Advisor supports automatic discovery of new assets (Asset Auto Discovery), adapting to the dynamics of the cloud environment. The product provides information about objects operating at all levels of the infrastructure:
- cloud level (VMs, IAM users, disks, managed databases, etc.);
- managed Kubernetes clusters level (Pods, Images, Containers, etc.);
- OS level (packages running on VMs/containers).
As before, any request can be turned into a permanent control. Cloud Advisor will automatically monitor your infrastructure's compliance with the specified requirement and send messages to the selected notification channels in case of any deviations.
The update simplifies access to information and speeds up your workflows, transforming the cloud from a “black box” into a transparent and controllable environment.
See for yourself! Try creating the following queries in the “Insights” section and find in your infrastructure:
- Publicly exposed running VMs with Critical vulnerabilities.
- All buckets that have versioning enabled and no lifecycle policies.
- All publicly exposed resources.
- All resources that have a tag with a specific value.
- All IP-addresses and resources that use them.
Query example: All publicly exposed VMs where secrets were found and which contain malicious code or critical vulnerability.
Query example: All security groups that allow unrestricted inbound connections and the resources that use these security groups.