Skip to main content

Google Workspace AlertCenter Source

thumbnail icon

This topic has information about the Google Workspace AlertCenter Cloud-to-Cloud Source, part of Sumo Logic's Cloud-to-Cloud Integration Framework.

Data Sources

The Google Workspace AlertCenter Source consumes data from the Alerts API.

The Source periodically fetches data from the API. The polling interval is 5 minutes.


If the Source is configured with the SIEM forward option, the metadata field _siemparser will be set to /Parsers/System/Google/GSuite Alert Center.

Configuration overview

In this configuration, you'll set up a Google service account, and configure the Google Workspace AlertCenter source to use this account to authenticate and be authorized to access the Google Alerts API.

Step 1: Create service account Credentials

To create Google Workspace AlertCenter service account credentials:

  1. From Google Cloud console, select your project or create a new one.
  2. Enable Google Workspace Alert Center API for the Alert API. To locate this setting, you can search for "Google Workspace Alert Center API" in the search bar. Then select the Enable button.
  3. You will be redirected to the dashboard page. Select the Credentials tab in the left panel.
  4. Click Create Credentials, and select Service Account to create service account credentials. Later you'll supply the account details and click Done to create a service account.
  5. To create JSON for the service account, you must create a key. Click the service account email to navigate to the Keys tab.
  6. Click Add key and select Create new key. At the prompt, select JSON and click Create to create a key.
  7. JSON for the service account is automatically downloaded. To see what the JSON looks like, and how the JSON fields map to the fields you'll configure, see the Service account JSON example below.
  8. Add domain-wide delegation to your service account using the client ID generated in step 5.
  9. From the Google admin console, add your OAuth scope to the service account using the instructions here and select it in the input form. The OAuth scope for alert API is:

    If you don't add an OAuth scope to your Google Workspace service account, you won't be authorized to fetch alert details. Learn more about OAuth scopes:

  10. For delegated user email, you need to add the email of the user whom you want to delegate for API calls.

Step 2: Configure the Google Workspace AlertCenter Source

  1. In Sumo Logic, go to Manage Data > Collection > Collection.
  2. On the Collectors page, click Add Source next to a Hosted Collector.
  3. Select Google Workspace AlertCenter.
  4. Name. Enter a name for the Source
  5. Description. (Optional). Enter the description of the Source.
  6. Source Category. Enter a string to tag the output collected from the Source. Category metadata is stored in a searchable field called _sourceCategory.
  7. Forward to SIEM. Click if you want the Source to forward the logs it ingests to Cloud SIEM Enterprise.
  8. Fields. (Optional) Click +Add Field to define the fields you want to associate, each field needs a name (key) and value. For more information, see Fields.
    • green check circle.png A green circle with a checkmark is shown when the field exists in the Fields table schema.
    • orange exclamation point.png An orange triangle with an exclamation point is shown when the field doesn't exist in the Fields table schema. In this case, an option to automatically add the nonexistent fields to the Fields table schema is provided. If a field is sent to Sumo Logic that does not exist in the Fields schema it is ignored (i.e., dropped).
  9. Delegated User Email. Enter the admin email address for the domain.
  10. Google Workspace AlertCenter Credentials. You can authenticate your service account credentials directly by uploading a JSON file credentials instead of breaking down the file into different sections for the UI schema. Click Upload and select the JSON file that you downloaded in the Service Account Credentials section.
  11. Exclude Alert Types. (Optional) Enter the data alert types and scope that you don't want to send to Sumo Logic.

    All alert types are selected by default unless you exclude some of the alert types in the config JSON schema.

  12. Processing Rules for Logs. (Optional) Configure any desired filters, such as allowlist, denylist, hash, or mask, as described in Create a Processing Rule.
  13. When you are finished configuring the Source, click Submit.

Error types

When Sumo Logic detects an issue it is tracked by Health Events. The following table shows the three possible error types, the reason the error would occur, if the Source attempts to retry, and the name of the event log in the Health Event Index.

TypeReasonRetriesRetry BehaviorHealth Event Name
ThirdPartyConfigNormally due to an invalid configuration. You'll need to review your Source configuration and make an update.No retries are attempted until the Source is updated.Not applicableThirdPartyConfigError
ThirdPartyGenericNormally due to an error communicating with the third-party service APIs.YesThe Source will retry for up to 90 minutes, after which it quits.ThirdPartyGenericError
FirstPartyGenericNormally due to an error communicating with the internal Sumo Logic APIs.YesThe Source will retry for up to 90 minutes, after which it quits.FirstPartyGenericError

Restarting your Source

If your Source encounters ThirdPartyConfig errors, you can restart it from either the Sumo Logic UI or Sumo Logic API.


To restart your source in the Sumo Logic platform, follow the steps below:

  1. Open the Collection page, and go to Manage Data > Collection > Collection.
  2. Select the source and click the information icon on the right side of the row.
  3. The API usage information popup is displayed. Click the Restart Source button on the bottom left.
  4. Click Confirm to send the restart request.
  5. The bottom left of the platform will provide a notification informing you the request was successful.


To restart your source using the Sumo Management API, follow the instructions below:

  • Method: POST
  • Example endpoint:{collector_id}/sources/{source_id}/action/restart

Sumo Logic endpoints like are different in deployments outside us1. For example, an API endpoint in Europe would begin A service endpoint in us2 (Western U.S.) would begin For more information, see Sumo Logic Endpoints.

JSON configuration

Sources can be configured using UTF-8 encoded JSON files with the Collector Management API. See how to use JSON to configure Sources for details. 

configJSON ObjectYesContains the configuration-parameters of the Source.
schemaRefJSON ObjectYesUse {"type":"Google Workspace AlertCenter"} for Google Workspace AlertCenter Source.not modifiable
sourceTypeStringYesUse Universal for Google Workspace AlertCenter Source.not modifiable

Config Parameters

nameStringYesType the desired name of the Source and it must be unique per Collector. This value is assigned to the metadata field _sourcemodifiable
descriptionStringNoType the description of the Source.modifiable
categoryStringNoType the category of the source. This value is assigned to the metadata field _sourceCategory.modifiable
fieldsJSON ObjectNoJSON map of key-value fields (metadata) to apply to the Collector or Source. Use the boolean field _siemForward to enable forwarding to SIEM.modifiable
delegatedUserEmailStringYesProvide the super-administrator email address for the domain that granted access to the service account you created.modifiable
credentialsJsonStringYesAuthentication service account's credentials to access Google Workspace Platform.modifiable
excludedAlertTypesArray of StringsNoDefines the types of alerts which the user want to exclude.modifiable

Example of Service account JSON

"type": "service_account",
"project_id": "sample_project",
"private_key_id": "asdfgh1234556",
"private_key": "-----BEGIN PRIVATE KEY-----\nsample_private_key\n-----END PRIVATE KEY-----\n",
"client_email": "",
"client_id": "12345678",
"auth_uri": "",
"token_uri": "",
"auth_provider_x509_cert_url": "",
"client_x509_cert_url": ""
Privacy Statement
Terms of Use

Copyright © 2023 by Sumo Logic, Inc.