@@ -410,10 +410,13 @@ func recordCommand(executedCmd *cobra.Command, authInfo *token.ParsedToken) erro
410410}
411411
412412cmdTracker  :=  telemetry .NewCommandTracker (telemetryClient )
413+ controlplaneURL , controlplaneHash  :=  hashControlPlaneURL ()
414+ 
413415tags  :=  telemetry.Tags {
414- "cli_version" : Version ,
415- "cp_url_hash" : hashControlPlaneURL (),
416- "chainloop_source" : "cli" ,
416+ "cli_version" : Version ,
417+ "cp_url_hash" : controlplaneHash ,
418+ "cp_installation_url" : controlplaneURL ,
419+ "chainloop_source" : "cli" ,
417420}
418421
419422// It tries to extract the token from the context and add it to the tags. If it fails, it will ignore it. 
@@ -423,6 +426,12 @@ func recordCommand(executedCmd *cobra.Command, authInfo *token.ParsedToken) erro
423426tags ["org_id" ] =  authInfo .OrgID 
424427}
425428
429+ // Add organization name if available 
430+ orgName  :=  viper .GetString (confOptions .organization .viperKey )
431+ if  orgName  !=  ""  {
432+ tags ["organization_name" ] =  orgName 
433+ }
434+ 
426435if  err  =  cmdTracker .Track (executedCmd .Context (), extractCmdLineFromCommand (executedCmd ), tags ); err  !=  nil  {
427436return  fmt .Errorf ("sending event: %w" , err )
428437}
@@ -446,10 +455,9 @@ func extractCmdLineFromCommand(cmd *cobra.Command) string {
446455}
447456
448457// hashControlPlaneURL returns a hash of the control plane URL 
449- func  hashControlPlaneURL () string  {
450- url  :=  viper .GetString ("control-plane.API" )
451- 
452- return  fmt .Sprintf ("%x" , sha256 .Sum256 ([]byte (url )))
458+ func  hashControlPlaneURL () (url  string , hash  string ) {
459+ url  =  viper .GetString (confOptions .controlplaneAPI .viperKey )
460+ return  url , fmt .Sprintf ("%x" , sha256 .Sum256 ([]byte (url )))
453461}
454462
455463func  apiInsecure () bool  {
0 commit comments