A log metric filter and alert should exist for audit configuration changes


Google Cloud Platform (GCP) services write audit log entries to the Admin Activity and Data Access logs to help answer the question of “Who did what, where, and when?” within GCP projects. Cloud audit logging records information such as the identity of the API caller, the time of the API call, the source IP address of the API caller, the request parameters, and the response elements returned by GCP services. Cloud audit logging provides a history of GCP API calls for an account, including API calls made through the console, SDKs, command-line tools, and other GCP services.


Cloud audit logging to Admin Activity and Data Access logs enables security analysis, resource change tracking, and compliance auditing. Configuring the metric filter and alerts for audit configuration changes ensures that the recommended state of audit configuration is maintained so that all activities in the project can be audited at any point in time.


Enabling logging may result in your project being charged for the additional logs usage.


From the console

Create the prescribed log metric

  1. Go to Logging/Logs-based Metrics by visiting https://console.cloud.google.com/logs/metrics and click CREATE METRIC.
  2. Set Metric Type to Counter. This ensures that the log metric counts the number of log entries matching the user’s advanced logs query.
  3. Fill out the Log metric name field.
  4. Set the Units to 1 (default).
  5. Under Filter selection, add the following text to the Build filter block:
    protoPayload.methodName="SetIamPolicy" AND
  6. Click Create Metric.

Create a prescribed alert policy

  1. Go to https://console.cloud.google.com/logs/metrics. Under the User-defined Metrics section, identify the newly created metric.
  2. Click the kebab icon in the rightmost column for the new metric and select Create alert from Metric.
  3. Leave the Enter a Monitoring filter field as is.
  4. Set Rolling window function to delta.
  5. Under Across time series, set the Time series aggregation field to count.
  6. Navigate to Configure trigger using the left-hand panel and leave the default value of threshold for Condition type.
  7. Choose the alerting threshold and trigger conditions that make most sense for your organization. For example, a Threshold value of 0 and an Alert trigger of Any time series violates ensures that a notification is triggered for every audit configuration change in the project.
  8. Navigate to Notifications and name to configure your desired notification channel and alerting policy name.
  9. Navigate to Review alert and validate that all values look as expected. Then, click CREATE POLICY.

From the command line

Create a prescribed log metric

Use the command: gcloud beta logging metrics create Reference for command usage: https://cloud.google.com/sdk/gcloud/reference/beta/logging/metrics/create

Create a prescribed alert policy

Use the command: gcloud alpha monitoring policies create Reference for command usage: https://cloud.google.com/sdk/gcloud/reference/alpha/monitoring/policies/create


  1. https://cloud.google.com/logging/docs/logs-based-metrics/
  2. https://cloud.google.com/monitoring/custom-metrics/
  3. https://cloud.google.com/monitoring/alerts/
  4. https://cloud.google.com/logging/docs/reference/tools/gcloud-logging
  5. https://cloud.google.com/logging/docs/audit/configure-data-access#getiampolicy-setiampolicy