ComplyBeacon is an open-source observability toolkit that collects, normalizes, and enriches compliance evidence by extending the OpenTelemetry (OTel) standard.
It bridges the gap between raw policy scanner output and modern logging pipelines, providing a unified, enriched, and auditable data stream for security and compliance analysis.
WARNING: All components are under initial development and are not ready for production use.
ComplyBeacon is composed of four components that form an evidence enrichment pipeline:
An instrumentation library that accepts raw compliance evidence from policy scanners (OPA, Gatekeeper, Conforma, Sentinel), normalizes it into OCSF/Gemara format, and emits it as an OpenTelemetry log stream with accompanying metrics.
A custom OpenTelemetry Collector distribution that hosts the pipeline. It receives log records via OTLP, webhook, or file input, batches and transforms them, then routes them through enrichment and on to exporters.
A custom OpenTelemetry Collector processor that enriches log records by calling the Compass service to attach compliance framework mappings, risk scores, and remediation guidance.
A policy-to-control lookup service that maps evidence attributes to compliance frameworks, baselines, and risk data. Compass is an external service that must be provided separately for TruthBeam enrichment to function.
graph TB
OPA["OPA"] --> NORM
GK["Gatekeeper"] --> NORM
CF["Conforma"] --> NORM
SEN["Sentinel"] --> NORM
subgraph pw ["ProofWatch - Instrumentation Library"]
NORM["Normalize Evidence<br/>OCSF / Gemara"] --> EMIT["Emit OTLP<br/>Logs + Metrics"]
end
EMIT -- "OTLP" --> OTLPRX
EMIT -- "OTLP" --> WHRX
subgraph beacon ["Beacon - OTel Collector Distribution"]
OTLPRX["OTLP Receiver"] --> BATCH
WHRX["Webhook Receiver"] --> BATCH
FLRX["FileLog Receiver"] --> BATCH
BATCH["Batch"] --> XFORM["Transform<br/>OCSF parse"]
XFORM --> TBPROC["TruthBeam<br/>Enrich"]
TBPROC --> S2M["SignalToMetrics"]
TBPROC --> DBG["Debug"]
TBPROC --> OTLPEX["OTLP/HTTP Exporter"]
TBPROC --> S3EX["S3 Exporter"]
S2M --> FILEEX["File Exporter"]
end
subgraph compass ["Compass - Enrichment Service"]
CAT[("Compliance<br/>Catalogs")] --- LOOKUP["Policy-to-Control<br/>Lookup"]
end
TBPROC -. "enrichment<br/>request" .-> LOOKUP
LOOKUP -. "controls, frameworks<br/>risk, remediation" .-> TBPROC
OTLPEX --> LOKI
S3EX --> S3STORE
subgraph outputs ["Downstream Systems"]
LOKI[("Loki")] --> GRAF["Grafana"]
S3STORE[("S3 Archive")] --> HP["Hyperproof"]
end
classDef sourceNode fill:#6366f1,stroke:#4338ca,color:#fff
classDef pwNode fill:#8b5cf6,stroke:#6d28d9,color:#fff
classDef beaconNode fill:#0ea5e9,stroke:#0284c7,color:#fff
classDef procNode fill:#d97706,stroke:#b45309,color:#fff
classDef compassNode fill:#f97316,stroke:#c2410c,color:#fff
classDef outputNode fill:#64748b,stroke:#334155,color:#fff
classDef catNode fill:#fbbf24,stroke:#b45309,color:#333
class OPA,GK,CF,SEN sourceNode
class NORM,EMIT pwNode
class OTLPRX,WHRX,FLRX,BATCH,XFORM,TBPROC,S2M beaconNode
class DBG,OTLPEX,S3EX,FILEEX procNode
class LOOKUP compassNode
class CAT catNode
class LOKI,S3STORE,GRAF,HP outputNode
style pw fill:#f5f3ff,stroke:#8b5cf6,stroke-width:2px
style beacon fill:#f0f9ff,stroke:#0ea5e9,stroke-width:2px
style compass fill:#fff7ed,stroke:#f97316,stroke-width:2px
style outputs fill:#f1f5f9,stroke:#64748b,stroke-width:2px
- Go 1.25+
- Task (taskfile.dev)
- Podman
- Git
# Install Task
brew install go-task/tap/go-task # macOS
# or
go install github.com/go-task/task/v3/cmd/task@latestThe demo stack runs Beacon, Loki, and Grafana via compose:
# Build the collector image (resolves deps, syncs versions, builds container)
task build
# Start all services
task infra:deploy
# Stop everything
task infra:undeploy# Send sample compliance evidence
curl -X POST http://localhost:8088/eventsource/receiver \
-H "Content-Type: application/json" \
-d @hack/sampledata/evidence.json
# View enriched logs in Grafana at http://localhost:3000The demo stack includes rustfs, an S3-compatible object store, so evidence archival works out-of-the-box with no configuration.
After task infra:deploy, the following are available:
| Service | URL | Credentials |
|---|---|---|
| rustfs S3 API | http://localhost:9000 | rustfsadmin / rustfsadmin |
| rustfs Console | http://localhost:9001 | rustfsadmin / rustfsadmin |
Evidence files are written to the complybeacon-evidence bucket and can be browsed in the rustfs console.
To export evidence to a real AWS S3 bucket, override the defaults by exporting environment variables before starting the stack:
| Variable | Default (local dev) | Description |
|---|---|---|
AWS_REGION |
us-east-1 |
AWS region of your S3 bucket |
S3_BUCKETNAME |
complybeacon-evidence |
Target S3 bucket name |
S3_OBJ_DIR |
evidence |
Folder prefix for objects |
AWS_ACCESS_KEY_ID |
rustfsadmin |
AWS access key |
AWS_SECRET_ACCESS_KEY |
rustfsadmin |
Corresponding secret key |
S3_ENDPOINT |
http://rustfs:9000 |
S3 endpoint (unset for AWS) |
Production deployments should use a dedicated collector configuration with disable_ssl: false and s3_force_path_style: false. See Sync_Evidence2Hyperproof for the full AWS integration guide.
task # List all available tasks
task build # Build the collector container image
task test # Run tests with coverage
task test-race # Run tests with race detection
task lint # Run golangci-lint
task check # Run all quality gates (lint + test)
task deps # Tidy, verify, and download dependencies
task workspace # Set up Go workspace
task clean # Remove build artifacts and test outputtask codegen:api-codegen # Regenerate OpenAPI client (truthbeam)
task codegen:weaver-codegen # Regenerate attribute constants from model/
task codegen:weaver-docsgen # Regenerate attribute docs from model/
task codegen:weaver-check # Validate semantic convention model
task codegen:weaver-semantic-check # Validate logs against semantic conventionsThe project prevents version drift between the Go modules and the beacon-distro collector distribution. Version checks run automatically with task test and block CI if versions diverge.
task version:check-otel-versions # Check alignment
task version:sync-otel-versions # Sync beacon-distro with truthbeam
task version:check-go-version # Verify Go version compatibility
task version:check-go-mod-consistency # Check OTel dependency consistencyThe beacon collector image is built from beacon-distro/Containerfile.collector:
# Build with default tag (complybeacon/collector:latest)
task build
# Build with custom image name and tag
task build IMAGE=ghcr.io/complytime/complybeacon TAG=v1.0.0
# Run standalone (without compose)
podman run --rm \
-v ./hack/demo/demo-config.yaml:/etc/otel-collector.yaml:Z \
-p 4317:4317 -p 8088:8088 \
complybeacon/collector:latest \
--config=/etc/otel-collector.yamlGrafana Dashboard: To configure Loki as default datasource, see hack/demo/terraform/README.md.
- Design & Architecture: docs/DESIGN.md
- Development Guide: docs/DEVELOPMENT.md
- Image Publishing: docs/publish_image/publish_image.md
- OpenTelemetry: opentelemetry.io