Now in beta · GCP Audit Logs

Find what's wrong in your cloud logs
before it finds you

Flare connects to your GCP Audit Logs and uses Claude AI to surface anomalous patterns — unusual IPs, privilege escalations, permission spikes — ranked by severity, explained in plain English.

prod-gcp-audit · Dec 14 2024 · 03:15 UTC
complete
3 anomalies detected14,832 logs analyzed
#1protoPayload.methodNameSetIamPolicy
critical
97

SetIamPolicy was called 847 times in this window vs. a baseline of 3/day. A single service account granted Owner access to 12 production projects at 2:14 AM.

Baseline
0.4% of events
Observed
67% of events
#2httpRequest.remoteIp185.220.101.47
critical
91

Source IP is a known Tor exit node (Proofpoint dataset). First appearance in 90-day history. All 23 API calls succeeded — no PERMISSION_DENIED responses.

Baseline
Never seen before
Observed
23 calls this window
#3protoPayload.status.codePERMISSION_DENIED
high
76

PERMISSION_DENIED errors spiked to 340 in 15 minutes — 98× the daily average of 3.5. Suggests automated credential stuffing or misconfigured service account.

Baseline
0.1% of events
Observed
12% of events
Ask Flare: "Why is the SetIamPolicy anomalous?"

How it works

From logs to answers in minutes

01

Connect your cloud

Link GCP Audit Logs via OAuth in under 60 seconds. No service account JSON keys, no manual configuration.

02

Claude analyzes your logs

Our AI reads your audit log patterns and surfaces the fields and values that don't fit — ranked by severity.

03

Ask follow-up questions

Chat with Flare directly about any anomaly. "Why is this suspicious?" "What should I check next?"

Built different

Not another SIEM

LLM-first detection

No static rules. No thresholds to tune. Claude understands context — rare IPs, odd timing, unusual operations.

Multi-cloud ready

GCP Audit Logs native today. AWS CloudTrail and Azure Activity Logs coming soon.

Plain English, always

Every anomaly comes with a clear explanation. Not just a score — a story you can act on.

Conversational follow-up

Ask questions about any finding. Flare remembers the full analysis context across your conversation.

Security-first architecture

Your log data is analyzed in-transit and never stored on our servers. Results only.

Ranked by impact

Anomalies scored 0-100 with critical/high/medium/low tiers. Know exactly where to look first.

Ready to see what's hiding in your logs?

Join the beta. Connect your GCP project and get your first anomaly report in under 2 minutes.

Start free beta →

No credit card · GCP, AWS, Azure