Skip to main content

Overview

The Google Cloud Platform (GCP) integration enables Steadwing to read logs, traces, and errors from your GCP projects. During root cause analysis, Steadwing queries Cloud Logging, Cloud Trace, and Error Reporting to identify issues, trace request flows, and analyze error patterns that correlate with production incidents.

Why Use GCP with Steadwing?

Log Analysis

Access Cloud Logging data to investigate application and infrastructure logs

Distributed Tracing

Analyze request traces to identify latency and performance bottlenecks

Error Tracking

Query Error Reporting for exception patterns and error frequencies

Cloud Infrastructure

Correlate incidents with GCP service events and resource states

Benefits

  • Comprehensive Log Access - Query logs from all GCP services and custom applications
  • Trace-Based Debugging - Follow request flows across microservices to find root causes
  • Error Pattern Detection - Identify recurring errors and their distribution
  • Read-Only Access - Steadwing only reads data, with no write permissions required
  • Multi-Project Support - Connect multiple GCP projects for unified analysis

Setup Instructions

Step 1: Create a Service Account

  1. Go to the GCP Console
  2. Select your project
  3. Navigate to IAM & AdminService Accounts
  4. Click + Create Service Account
  5. Configure the service account:
    • Service account name: steadwing-integration
    • Service account ID: steadwing-integration (auto-generated)
    • Description: Steadwing read-only access for logs, traces, and errors
  6. Grant the following read-only roles:
    • Logs Viewer (roles/logging.viewer)
    • Cloud Trace Viewer (roles/cloudtrace.user)
    • Error Reporting Viewer (roles/errorreporting.viewer)
  7. Click Done to create the service account
Steadwing only requires read permissions. Do not grant write or admin roles to maintain security.

Step 2: Connect via Google Authentication

  1. Navigate to Steadwing Integrations
  2. Find the Google Cloud Platform integration card
  3. Toggle the switch to Enable the integration
  4. You’ll be redirected to Google’s authentication page
  5. Sign in with your Google account that has access to your GCP project
  6. Grant Steadwing the requested read-only permissions
  7. You’ll be redirected back to Steadwing with the integration connected

How GCP Integration Works

Data Collection

Steadwing queries GCP for:
  • Cloud Logging - Application logs, system logs, audit logs, and custom logs
  • Cloud Trace - Distributed traces showing request latency and service dependencies
  • Error Reporting - Error events, stack traces, and error frequency data
  • Resource Metadata - GCP service information and resource configurations

Root Cause Analysis

When analyzing an incident, Steadwing:
  1. Identifies the incident time window
  2. Queries relevant logs from Cloud Logging
  3. Retrieves distributed traces for affected requests
  4. Analyzes error patterns from Error Reporting
  5. Correlates GCP events with incident timing
  6. Includes log excerpts, traces, and error insights in the RCA report

Read-Only Operations

All GCP API calls are read-only:
  • ✅ Read log entries
  • ✅ Query trace data
  • ✅ View error reports
  • ❌ No write operations
  • ❌ No resource modifications
  • ❌ No configuration changes

Configuration

Required Permissions

The GCP service account requires these read-only roles:
RolePermissionPurpose
Logs Viewerroles/logging.viewerRead Cloud Logging entries
Cloud Trace Viewerroles/cloudtrace.userAccess distributed trace data
Error Reporting Viewerroles/errorreporting.viewerRead error reports and statistics

Multi-Project Setup

To monitor multiple GCP projects:
  1. Ensure your Google account has access to multiple projects
  2. Authenticate once through the Steadwing integrations page
  3. Select which projects you want to grant Steadwing access to during the OAuth flow

FAQs

No, Steadwing only requires read-only access. The integration uses Logs Viewer, Cloud Trace Viewer, and Error Reporting Viewer roles, which provide no write capabilities.
Yes, you need to create a service account in your GCP project with the appropriate read-only roles. After that, authentication is handled automatically through Google’s OAuth flow when you toggle the integration in Steadwing.
No, the required permissions are strictly read-only. Steadwing cannot modify logs, delete traces, change configurations, or alter any GCP resources.
Use a Google account that has access to your GCP projects. The account should have permissions to view the resources that the service account has been granted access to.
Yes, API calls made by Steadwing count toward your GCP project quotas. The integration is optimized to make minimal calls, typically only during active incident analysis.
Yes, during the OAuth authentication flow, you can select multiple projects to grant Steadwing access to. Your Google account must have appropriate permissions for each project.
To revoke access, go to your Google Account permissions page, find Steadwing, and remove access. You can also toggle off the integration in Steadwing Settings.
Need additional help? Please reach out to us at [email protected]