gcp-cloud-monitoring
SKILL.md
GCP Cloud Monitoring
Monitor Google Cloud infrastructure via the Cloud Monitoring MCP server — query time series metrics, inspect alert policies, check active alerts, and discover available metric types.
MCP Server
- Endpoint:
https://monitoring.googleapis.com/mcp(Streamable HTTP) - Auth: OAuth 2.0 via Google IAM — service account key (
GOOGLE_APPLICATION_CREDENTIALS) orgcloud auth application-default login - Requires:
GCP_PROJECT_IDenvironment variable
Available Tools (6)
| Tool | What It Does |
|---|---|
list_timeseries |
Query time series data — CPU, memory, network, disk metrics for any GCP resource |
list_metric_descriptors |
Discover available metric types in a project — find what you can monitor |
list_alert_policies |
List all alerting policies — conditions, notification channels, thresholds |
get_alert_policy |
Get details of a specific alerting policy |
list_alerts |
List current and past alert violations — what's firing right now |
get_alert |
Get details of a specific alert violation |
Workflow: GCP Network Monitoring
When a user asks "how is our GCP network performing?":
- Check alerts:
list_alertsto find any active alert violations - VM network metrics:
list_timeseriesforcompute.googleapis.com/instance/network/received_bytes_countandsent_bytes_count - Packet drops:
list_timeseriesforcompute.googleapis.com/instance/network/received_packets_dropped_count - Firewall metrics:
list_timeseriesforcompute.googleapis.com/firewall/dropped_packets_count - Load balancer metrics:
list_timeseriesforloadbalancing.googleapis.com/https/request_countandtotal_latencies - Report: Network health dashboard with any issues flagged
Workflow: Alert Investigation
When investigating GCP alerts:
- List active alerts:
list_alerts— find what's currently firing - Get alert details:
get_alert— condition, threshold, resource affected - Get policy:
get_alert_policy— what triggers this alert, notification channels - Pull metrics:
list_timeseriesfor the affected metric — see the spike/anomaly - Cross-reference: Use
gcp-cloud-loggingfor correlated log entries - Report: Alert investigation with root cause and timeline
Workflow: Resource Health Check
When checking GCP infrastructure health:
- Discover metrics:
list_metric_descriptorsfiltered by service (compute, networking, loadbalancing) - VM CPU/Memory:
list_timeseriesforcompute.googleapis.com/instance/cpu/utilizationand memory metrics - Disk I/O:
list_timeseriesforcompute.googleapis.com/instance/disk/read_bytes_countand write metrics - Network throughput:
list_timeseriesfor network sent/received bytes - Alert status:
list_alert_policies+list_alerts— any policies in violation? - Report: Infrastructure health dashboard with severity ratings
Common GCP Network Metrics
| Metric | What It Tells You |
|---|---|
compute.googleapis.com/instance/network/received_bytes_count |
Inbound network throughput per VM |
compute.googleapis.com/instance/network/sent_bytes_count |
Outbound network throughput per VM |
compute.googleapis.com/instance/network/received_packets_dropped_count |
Dropped inbound packets (congestion) |
compute.googleapis.com/instance/network/sent_packets_dropped_count |
Dropped outbound packets (congestion) |
compute.googleapis.com/firewall/dropped_packets_count |
Packets dropped by VPC firewall rules |
loadbalancing.googleapis.com/https/request_count |
HTTP(S) LB request rate |
loadbalancing.googleapis.com/https/total_latencies |
HTTP(S) LB end-to-end latency |
loadbalancing.googleapis.com/https/backend_latencies |
Backend response time behind LB |
vpn.googleapis.com/tunnel_established |
Cloud VPN tunnel state (1=up, 0=down) |
vpn.googleapis.com/sent_bytes_count |
Bytes sent through VPN tunnel |
router.googleapis.com/bgp/received_routes_count |
BGP routes received by Cloud Router |
interconnect.googleapis.com/link/received_bytes_count |
Cloud Interconnect link throughput |
Important Rules
- Remote MCP server — hosted by Google, no local install needed
- OAuth 2.0 authentication — uses IAM for access control
- Project-scoped — metrics are scoped to the configured GCP project
- Read-only — monitoring queries don't modify anything
- Record in GAIT — log monitoring investigations for audit trail
Environment Variables
GCP_PROJECT_ID— Google Cloud project IDGOOGLE_APPLICATION_CREDENTIALS— Path to service account key JSON file
Weekly Installs
1
Repository
automateyournet…/netclawGitHub Stars
282
First Seen
10 days ago
Security Audits
Installed on
mcpjam1
claude-code1
replit1
junie1
windsurf1
zencoder1