Ingest Google Cloud Monitoring Metrics
groundcover supports ingesting Google Cloud Monitoring Metrics directly into our platform, allowing you to visualize them using dashboards and create alerts.
Things to know
Integration Interval
The integration pulls data from Azure Monitor according to this interval. The lower the interval, the higher the polling rate and as a result, the overall costs will be higher. The interval can be altered in the Advanced Settings in the configuration wizard.
Data storage
Data fetched is stored in the Victoria Metrics database, meaning metrics are queried via the Google Cloud Monitoring API only one time per data point.
Supported services
groundcover supports ingestion of every GCP service listed in the GCP docs. Users should provide a prefix of a service or metric in order to pull it, e.g. cloudsql.googleapis.com will pull all metrics for CloudSQL, while cloudsql.googleapis.com/database/active_directory/domain_reachable will pull this specific metric.
Setting up the integration
The integration setup is done directly through the App by following these steps:
Navigate to Settings > Integrations > Data Sources or following this link. Note that only users with Admin permissions can navigate to this page.
Select Google Cloud Platform and follow the 3 steps in the wizard. Note that in step 1 you'll need to provide a Service Account, granting groundcover with permissions to poll metrics. To create a service account, please follow the guidelines in the next section.
Create a Service Account and Assign Permissions
Go to IAM & Admin in GCP Console
Navigate to IAM & Admin → Service Accounts.
Create a New Service Account
Click on Create Service Account.
Provide a name and description for the service account.
Click Create & Continue.
In the Grant this service account access to the project step, search for and select Monitoring Viewer (
roles/monitoring.viewer).Click Continue → Done.
Grant service account impersonation access
Click on the newly created service account → Permissions → View by Principals → Grant Access
In the Add principals → New principal section enter the <integrations-sa> provided to you.
In the Assign roles → Role section choose Service Account Token Creator
Click Save
Last updated
