Skip to main content

Telemetry

Introduction

The ColorTokens Xshield agent software collects various telemetry data to build visibility of servers (including their applications, network connections, open ports, etc.).

The agent software uses native operating system APIs to retrieve this information at regular intervals. This data is then distributed to the Xshield platform, which uses it to:

  • Visualize network communications
  • Identify vulnerabilities
  • Apply security policies

Telemetry Data Types

Data TypeDescription
Hardware• CPU • Memory • Network Interfaces (NIC)
Operating System• Version • Patches • Software Versions • CPU & Memory Usage • Open ports • Host Name • Interfaces (Name, IP address)
Network Flow DataMetadata of network traffic including: • Source • Destination • Port • Protocol • Traffic statistics (Bytes, Packets)
Host Firewall• Firewall Status • Programmed Rules • Firewall actions
Firewall EventLogs• Connection allowed events • Connection blocked events

Data Transfer Frequency

The following table describes how frequently different types of telemetry data are sent to the Xshield platform:

TypeInterval (seconds)Description
Heartbeat120Basic telemetry
Traffic Metrics120Traffic data sent to telemetry.[cluster].colortokens.com
Port Metrics1800Listening ports information. Short-lived port listening is handled in traffic metrics
Firewall Logs300Captured firewall allowed/denied logs. Allowed traffic exported only in test-mode
Firewall Rules1800Rules programmed on the host firewall
Agent Logs600Agent logs sent directly to logs.[cluster].colortokens.com
Agent Compute Usage120CPU and memory metrics: • Collected every 2 minutes • Reported as sliding window average (window size: 5) • Memory reported if average changes by >10MB • CPU reported if average changes by >5%
North-South Source IP visibility21600 (6 hours)-
Network Flows Upload (SIEM)900Only when flow collection is enabled under integrations. Supported only for Server & Gatekeeper Agents

Traffic Collection

Network telemetry is collected using the operating system's native tools such as PCAP. Key points:

  • Collection typically occurs only on NICs where traffic enters/exits the server/endpoint
  • No traffic metrics are collected for:
    • Tunnel interfaces (e.g., TAP, TUN)
    • Loopback interfaces

Agent Compute Resource Usage

The Xshield agent uses minimal compute resources to perform its operations. However, compute usage may increase if the traffic load is heavey on the system. The Xshield agent is built to not exceed resource usage beyond the specified limits during these periods of peak activity.

The Xshield agent also may use the filesystem to store collected data if it is not able to communicate back to the Xshield platform. This is done so as to not lose any critical network communications.

The following table provides the maximum use of compute resources by the Xshield agent.

ComputeUpper bound
CPU< 10%
RAM100 MB
Disk1 GB
Bandwidth50-75 MB data per day