Run item
gemini · Metabase · question_index=7
Question
How does Looker ensure data security compliance?
Answer
Looker ensures data security compliance through a comprehensive suite of features and practices, including robust encryption, strong authentication methods, granular access controls, detailed auditing, and adherence to key industry compliance standards.
Key aspects of Looker's approach to data security and compliance include:
* **Data Encryption** Looker encrypts data both at rest and in transit. Data moving between the user's browser and Looker's application is secured using TLS 1.2+ encryption, while data at rest utilizes AES-256 encryption. Looker also allows for customer-managed encryption keys (CMEK) to encrypt sensitive data at rest.
* **Authentication** The platform supports multi-factor authentication (MFA), often through app-based authenticators, and integrates with identity providers for single sign-on (SSO) to centralize authentication and enforce consistent policies. Looker also provides support for SAML-based SSO and LDAP for user authentication.
* **Access Controls and Data Governance** Looker implements role-based access control (RBAC), enabling organizations to define specific permissions aligned with user responsibilities and ensure users only access necessary data. This includes granular permission systems and row-level security to customize data visibility based on user attributes. LookML limitations can also be used to restrict sensitive data exposure through controlled data modeling. Centralized policy enforcement helps apply governance rules consistently across data models.
* **Auditing and Monitoring** Looker provides detailed audit logs to track user activity, including logins, report generation, and data access, which aids in compliance reporting and security monitoring. Regular security checks, monitoring logs, and periodic access reviews are also recommended practices.
* **Compliance Standards** Looker aligns with various compliance standards crucial for organizations handling sensitive data. These include SOC 2, ISO 27001, and HIPAA. For protected health information (PHI), a Business Associate Agreement (BAA) with Google Cloud helps ensure HIPAA compliance. Looker also offers compliance extensions for regulations like GDPR, automating compliance workflows and helping with data protection requirements.
* **Secure Data Connections and Data Masking** Looker facilitates secure, encrypted connections to various data sources. It also enables data masking and redaction to automatically obscure personally identifiable information (PII) in reports to protect individual privacy.
* **Third-Party Penetration Tests** Looker conducts regular third-party penetration tests on its application and hosted environment to identify and address vulnerabilities.
Citations
No citations found.
Raw meta json
{
"attempts": 1,
"backoff_ms_total": 0,
"grounding_enabled": true,
"latency_ms": 7970,
"model": "gemini-2.5-flash",
"raw_response": {
"automatic_function_calling_history": [],
"candidates": [
{
"avg_logprobs": null,
"citation_metadata": null,
"content": {
"parts": [
{
"code_execution_result": null,
"executable_code": null,
"file_data": null,
"function_call": null,
"function_response": null,
"inline_data": null,
"media_resolution": null,
"text": "Looker ensures data security compliance through a comprehensive suite of features and practices, including robust encryption, strong authentication methods, granular access controls, detailed auditing, and adherence to key industry compliance standards.\n\nKey aspects of Looker\u0027s approach to data security and compliance include:\n* **Data Encryption** Looker encrypts data both at rest and in transit. Data moving between the user\u0027s browser and Looker\u0027s application is secured using TLS 1.2+ encryption, while data at rest utilizes AES-256 encryption. Looker also allows for customer-managed encryption keys (CMEK) to encrypt sensitive data at rest.\n* **Authentication** The platform supports multi-factor authentication (MFA), often through app-based authenticators, and integrates with identity providers for single sign-on (SSO) to centralize authentication and enforce consistent policies. Looker also provides support for SAML-based SSO and LDAP for user authentication.\n* **Access Controls and Data Governance** Looker implements role-based access control (RBAC), enabling organizations to define specific permissions aligned with user responsibilities and ensure users only access necessary data. This includes granular permission systems and row-level security to customize data visibility based on user attributes. LookML limitations can also be used to restrict sensitive data exposure through controlled data modeling. Centralized policy enforcement helps apply governance rules consistently across data models.\n* **Auditing and Monitoring** Looker provides detailed audit logs to track user activity, including logins, report generation, and data access, which aids in compliance reporting and security monitoring. Regular security checks, monitoring logs, and periodic access reviews are also recommended practices.\n* **Compliance Standards** Looker aligns with various compliance standards crucial for organizations handling sensitive data. These include SOC 2, ISO 27001, and HIPAA. For protected health information (PHI), a Business Associate Agreement (BAA) with Google Cloud helps ensure HIPAA compliance. Looker also offers compliance extensions for regulations like GDPR, automating compliance workflows and helping with data protection requirements.\n* **Secure Data Connections and Data Masking** Looker facilitates secure, encrypted connections to various data sources. It also enables data masking and redaction to automatically obscure personally identifiable information (PII) in reports to protect individual privacy.\n* **Third-Party Penetration Tests** Looker conducts regular third-party penetration tests on its application and hosted environment to identify and address vulnerabilities.",
"thought": null,
"thought_signature": null,
"video_metadata": null
}
],
"role": "model"
},
"finish_message": null,
"finish_reason": "STOP",
"grounding_metadata": {
"google_maps_widget_context_token": null,
"grounding_chunks": [
{
"maps": null,
"retrieved_context": null,
"web": {
"domain": null,
"title": "secoda.co",
"uri": "https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEhD6kC69g4szcff81J15Z9_cwtkMLTdNIaI8WypdxkyT_vmwqf8FhqDlxiUo0iFvACOy09XPUgVUjDLZuccMblpfoX3OYt2MGC0SggFRGtdDYS7zCkw49M--fairLgacJKaqWLqDAEhDUFGRCT_3WGAA=="
}
},
{
"maps": null,
"retrieved_context": null,
"web": {
"domain": null,
"title": "socialchamps.com",
"uri": "https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFLNBHiovMpeOezwq6-Twr9ZwuEfLEaM6J_7FhzBZIug7N0UhoOZqchPyGz5y1QWuI5fFAumV9BAeA1WbCVEYpB2k2Ye0SS8HlMx-oLpqQwzQYsNz9WFPThzLxpkG9olSnj64d2ftvtHPfWuaApmDe9czhPbrdHRAvjalYW6bXtQww5joSDBxqE88HATcgPUF4="
}
},
{
"maps": null,
"retrieved_context": null,
"web": {
"domain": null,
"title": "digitalanalystteam.com",
"uri": "https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGugBm4fNsymfaY8kMrbicQu23ClkeUP5b8OiaR7DHVG62ymv-DjYZtQc6lRTNkNBmOctynv87jz8NASQpuiWoOGU3WHhUmVVZEI80snKBY9nNYLwnhe-WVMX90Xrr9u2n8gRJBzq6g8qz0_GtCnL2F7y7xa_Mk1euExV5FD5mcA_v5e1_yBNVu5kqj9G7jvq5kUR10hiAr1n4fzyiF2k9RYW6PQHqXGbXrix5ZS1rycJS-RppRkw=="
}
},
{
"maps": null,
"retrieved_context": null,
"web": {
"domain": null,
"title": "webstarresearch.com",
"uri": "https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFsb1qMUL2ldG8Yts5aB1mCpz6AY6qY60E68j9p31Pdmq8ICfAX_LviG4cv9OSi5COzvS7wTMW_cxLuY7X2pWPzHH1Zsgw7YYgeEi2yqpFxJs2gj592zVsnKN3W-_1S8A9xsdX6-IkbZcx1DPfQUQbpfyqnfcPKd38I_L86jv9GXmbmLatKEJIFEY3y"
}
},
{
"maps": null,
"retrieved_context": null,
"web": {
"domain": null,
"title": "google.com",
"uri": "https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFpRF811KBylsoeMo1ZZUDTgDW3Y2r8PekZJf2AnCOODstwNRfb1zexwjCC8LJ2cdLMFUGAAB1UJLTh5Yz2rglV-MxnPP5ZR97u8UTDmr85cDj0cM6VcEobED3iRstvysrLS0t58ms6eb6uaw=="
}
},
{
"maps": null,
"retrieved_context": null,
"web": {
"domain": null,
"title": "google.com",
"uri": "https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHIk1MbzlmjatSfkxY_7yBYayaSUNXnKoGMMMt261glmcQ5RjlZv1YzjUOfZVE0qLF10k-JncUKnKZ728XCpr0QZUhs0rvSv0jcZwF2gnF1sCYeHFcSOD5mrGnfFfVcXMgkuj8BqTywcZTswONrKxCNVHtp46c1t-yleiexa4K9r1GKn1taO3REKbVcs6fvfwyhvS2M5orb6w=="
}
},
{
"maps": null,
"retrieved_context": null,
"web": {
"domain": null,
"title": "complereinfosystem.com",
"uri": "https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEbVWPytrzXUtRPI4eqY3HRbfx9mHYH3i9LRKSjY4dVe7vwYEBJTp_CA7lR5uAI98XDHCxdZIGJyrwv7wFhuMijMrriIqg5LzeSEPwbaEKUFzrPdb9AUCcgu_uT4doyAvrNqUe1pmY48244eX4ISi-N2FC9xUBydA7uVw19mHrZorf8tgI="
}
}
],
"grounding_supports": [
{
"confidence_scores": null,
"grounding_chunk_indices": [
0,
1,
2,
3,
4
],
"segment": {
"end_index": 552,
"part_index": null,
"start_index": 403,
"text": "Data moving between the user\u0027s browser and Looker\u0027s application is secured using TLS 1.2+ encryption, while data at rest utilizes AES-256 encryption."
}
},
{
"confidence_scores": null,
"grounding_chunk_indices": [
4
],
"segment": {
"end_index": 650,
"part_index": null,
"start_index": 553,
"text": "Looker also allows for customer-managed encryption keys (CMEK) to encrypt sensitive data at rest."
}
},
{
"confidence_scores": null,
"grounding_chunk_indices": [
0,
1,
3
],
"segment": {
"end_index": 896,
"part_index": null,
"start_index": 651,
"text": "* **Authentication** The platform supports multi-factor authentication (MFA), often through app-based authenticators, and integrates with identity providers for single sign-on (SSO) to centralize authentication and enforce consistent policies."
}
},
{
"confidence_scores": null,
"grounding_chunk_indices": [
4
],
"segment": {
"end_index": 978,
"part_index": null,
"start_index": 897,
"text": "Looker also provides support for SAML-based SSO and LDAP for user authentication."
}
},
{
"confidence_scores": null,
"grounding_chunk_indices": [
0,
1,
2,
5,
6
],
"segment": {
"end_index": 1208,
"part_index": null,
"start_index": 979,
"text": "* **Access Controls and Data Governance** Looker implements role-based access control (RBAC), enabling organizations to define specific permissions aligned with user responsibilities and ensure users only access necessary data."
}
},
{
"confidence_scores": null,
"grounding_chunk_indices": [
0
],
"segment": {
"end_index": 1328,
"part_index": null,
"start_index": 1209,
"text": "This includes granular permission systems and row-level security to customize data visibility based on user attributes."
}
},
{
"confidence_scores": null,
"grounding_chunk_indices": [
0
],
"segment": {
"end_index": 1434,
"part_index": null,
"start_index": 1329,
"text": "LookML limitations can also be used to restrict sensitive data exposure through controlled data modeling."
}
},
{
"confidence_scores": null,
"grounding_chunk_indices": [
0
],
"segment": {
"end_index": 1527,
"part_index": null,
"start_index": 1435,
"text": "Centralized policy enforcement helps apply governance rules consistently across data models."
}
},
{
"confidence_scores": null,
"grounding_chunk_indices": [
0,
1,
2
],
"segment": {
"end_index": 1733,
"part_index": null,
"start_index": 1528,
"text": "* **Auditing and Monitoring** Looker provides detailed audit logs to track user activity, including logins, report generation, and data access, which aids in compliance reporting and security monitoring."
}
},
{
"confidence_scores": null,
"grounding_chunk_indices": [
3
],
"segment": {
"end_index": 1835,
"part_index": null,
"start_index": 1734,
"text": "Regular security checks, monitoring logs, and periodic access reviews are also recommended practices."
}
},
{
"confidence_scores": null,
"grounding_chunk_indices": [
1
],
"segment": {
"end_index": 2006,
"part_index": null,
"start_index": 1964,
"text": "These include SOC 2, ISO 27001, and HIPAA."
}
},
{
"confidence_scores": null,
"grounding_chunk_indices": [
1
],
"segment": {
"end_index": 2132,
"part_index": null,
"start_index": 2007,
"text": "For protected health information (PHI), a Business Associate Agreement (BAA) with Google Cloud helps ensure HIPAA compliance."
}
},
{
"confidence_scores": null,
"grounding_chunk_indices": [
2,
5
],
"segment": {
"end_index": 2279,
"part_index": null,
"start_index": 2133,
"text": "Looker also offers compliance extensions for regulations like GDPR, automating compliance workflows and helping with data protection requirements."
}
},
{
"confidence_scores": null,
"grounding_chunk_indices": [
2
],
"segment": {
"end_index": 2402,
"part_index": null,
"start_index": 2280,
"text": "* **Secure Data Connections and Data Masking** Looker facilitates secure, encrypted connections to various data sources."
}
},
{
"confidence_scores": null,
"grounding_chunk_indices": [
2
],
"segment": {
"end_index": 2554,
"part_index": null,
"start_index": 2403,
"text": "It also enables data masking and redaction to automatically obscure personally identifiable information (PII) in reports to protect individual privacy."
}
},
{
"confidence_scores": null,
"grounding_chunk_indices": [
4
],
"segment": {
"end_index": 2729,
"part_index": null,
"start_index": 2555,
"text": "* **Third-Party Penetration Tests** Looker conducts regular third-party penetration tests on its application and hosted environment to identify and address vulnerabilities."
}
}
],
"retrieval_metadata": null,
"retrieval_queries": null,
"search_entry_point": {
"rendered_content": "\u003cstyle\u003e\n.container {\n align-items: center;\n border-radius: 8px;\n display: flex;\n font-family: Google Sans, Roboto, sans-serif;\n font-size: 14px;\n line-height: 20px;\n padding: 8px 12px;\n}\n.chip {\n display: inline-block;\n border: solid 1px;\n border-radius: 16px;\n min-width: 14px;\n padding: 5px 16px;\n text-align: center;\n user-select: none;\n margin: 0 8px;\n -webkit-tap-highlight-color: transparent;\n}\n.carousel {\n overflow: auto;\n scrollbar-width: none;\n white-space: nowrap;\n margin-right: -12px;\n}\n.headline {\n display: flex;\n margin-right: 4px;\n}\n.gradient-container {\n position: relative;\n}\n.gradient {\n position: absolute;\n transform: translate(3px, -9px);\n height: 36px;\n width: 9px;\n}\n@media (prefers-color-scheme: light) {\n .container {\n background-color: #fafafa;\n box-shadow: 0 0 0 1px #0000000f;\n }\n .headline-label {\n color: #1f1f1f;\n }\n .chip {\n background-color: #ffffff;\n border-color: #d2d2d2;\n color: #5e5e5e;\n text-decoration: none;\n }\n .chip:hover {\n background-color: #f2f2f2;\n }\n .chip:focus {\n background-color: #f2f2f2;\n }\n .chip:active {\n background-color: #d8d8d8;\n border-color: #b6b6b6;\n }\n .logo-dark {\n display: none;\n }\n .gradient {\n background: linear-gradient(90deg, #fafafa 15%, #fafafa00 100%);\n }\n}\n@media (prefers-color-scheme: dark) {\n .container {\n background-color: #1f1f1f;\n box-shadow: 0 0 0 1px #ffffff26;\n }\n .headline-label {\n color: #fff;\n }\n .chip {\n background-color: #2c2c2c;\n border-color: #3c4043;\n color: #fff;\n text-decoration: none;\n }\n .chip:hover {\n background-color: #353536;\n }\n .chip:focus {\n background-color: #353536;\n }\n .chip:active {\n background-color: #464849;\n border-color: #53575b;\n }\n .logo-light {\n display: none;\n }\n .gradient {\n background: linear-gradient(90deg, #1f1f1f 15%, #1f1f1f00 100%);\n }\n}\n\u003c/style\u003e\n\u003cdiv class=\"container\"\u003e\n \u003cdiv class=\"headline\"\u003e\n \u003csvg class=\"logo-light\" width=\"18\" height=\"18\" viewBox=\"9 9 35 35\" fill=\"none\" xmlns=\"http://www.w3.org/2000/svg\"\u003e\n \u003cpath fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M42.8622 27.0064C42.8622 25.7839 42.7525 24.6084 42.5487 23.4799H26.3109V30.1568H35.5897C35.1821 32.3041 33.9596 34.1222 32.1258 35.3448V39.6864H37.7213C40.9814 36.677 42.8622 32.2571 42.8622 27.0064V27.0064Z\" fill=\"#4285F4\"/\u003e\n \u003cpath fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M26.3109 43.8555C30.9659 43.8555 34.8687 42.3195 37.7213 39.6863L32.1258 35.3447C30.5898 36.3792 28.6306 37.0061 26.3109 37.0061C21.8282 37.0061 18.0195 33.9811 16.6559 29.906H10.9194V34.3573C13.7563 39.9841 19.5712 43.8555 26.3109 43.8555V43.8555Z\" fill=\"#34A853\"/\u003e\n \u003cpath fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M16.6559 29.8904C16.3111 28.8559 16.1074 27.7588 16.1074 26.6146C16.1074 25.4704 16.3111 24.3733 16.6559 23.3388V18.8875H10.9194C9.74388 21.2072 9.06992 23.8247 9.06992 26.6146C9.06992 29.4045 9.74388 32.022 10.9194 34.3417L15.3864 30.8621L16.6559 29.8904V29.8904Z\" fill=\"#FBBC05\"/\u003e\n \u003cpath fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M26.3109 16.2386C28.85 16.2386 31.107 17.1164 32.9095 18.8091L37.8466 13.8719C34.853 11.082 30.9659 9.3736 26.3109 9.3736C19.5712 9.3736 13.7563 13.245 10.9194 18.8875L16.6559 23.3388C18.0195 19.2636 21.8282 16.2386 26.3109 16.2386V16.2386Z\" fill=\"#EA4335\"/\u003e\n \u003c/svg\u003e\n \u003csvg class=\"logo-dark\" width=\"18\" height=\"18\" viewBox=\"0 0 48 48\" xmlns=\"http://www.w3.org/2000/svg\"\u003e\n \u003ccircle cx=\"24\" cy=\"23\" fill=\"#FFF\" r=\"22\"/\u003e\n \u003cpath d=\"M33.76 34.26c2.75-2.56 4.49-6.37 4.49-11.26 0-.89-.08-1.84-.29-3H24.01v5.99h8.03c-.4 2.02-1.5 3.56-3.07 4.56v.75l3.91 2.97h.88z\" fill=\"#4285F4\"/\u003e\n \u003cpath d=\"M15.58 25.77A8.845 8.845 0 0 0 24 31.86c1.92 0 3.62-.46 4.97-1.31l4.79 3.71C31.14 36.7 27.65 38 24 38c-5.93 0-11.01-3.4-13.45-8.36l.17-1.01 4.06-2.85h.8z\" fill=\"#34A853\"/\u003e\n \u003cpath d=\"M15.59 20.21a8.864 8.864 0 0 0 0 5.58l-5.03 3.86c-.98-2-1.53-4.25-1.53-6.64 0-2.39.55-4.64 1.53-6.64l1-.22 3.81 2.98.22 1.08z\" fill=\"#FBBC05\"/\u003e\n \u003cpath d=\"M24 14.14c2.11 0 4.02.75 5.52 1.98l4.36-4.36C31.22 9.43 27.81 8 24 8c-5.93 0-11.01 3.4-13.45 8.36l5.03 3.85A8.86 8.86 0 0 1 24 14.14z\" fill=\"#EA4335\"/\u003e\n \u003c/svg\u003e\n \u003cdiv class=\"gradient-container\"\u003e\u003cdiv class=\"gradient\"\u003e\u003c/div\u003e\u003c/div\u003e\n \u003c/div\u003e\n \u003cdiv class=\"carousel\"\u003e\n \u003ca class=\"chip\" href=\"https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGRq3rRI_qUDf4IX8C0NuYae18mKIZvBXwb67GcaWhrpS44hEwgZPdV3Lt0wJvZ_u9nSdOWLA65u5BsqIyy3eauobSq3dbYgEL2tNUs2ThQbviSeye1nzpXhUaoKxyc12mhWXCHmJGJpdkC2_PfQRIorlrs1lVXEhVHNlLP7zlLHApnGPrM3a-Pxio6GNP-j2zQ3-k96paSww==\"\u003eLooker certifications\u003c/a\u003e\n \u003ca class=\"chip\" href=\"https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEVvUnNPlHacscec2nFJ3ShsYL8oZtA6h-MEyHyWJ6mSDf40mIbur-bUWQb7rGSg1jNGe948hYPuwvD0ORz4eFOG-F9ijoXYIVhBQeoRK1UG516UQdZNUdywiLyUYwYbMCECHziL7YY-YsGjaTH2nyajSxMML9p8RZh7WSQRZCXGMcgX2mi4VJeFArw7Lnt-jOBwckCY093U3O5YD5TgYDe1wQ=\"\u003eLooker data security compliance\u003c/a\u003e\n \u003ca class=\"chip\" href=\"https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQECdoo6xqj37dHRvxuK19YqNdHJ2Nkhq72wWwwaq221qFGI_TCdfARnHOApqA50F3zmkYR1uGAbrYOpak4OTZp3_aEqN29sjMbORZexikOF-6jhE1A5EtmUZvPRe2r0LcbwDYLIUJsWL3DYxB30Sp_uuB8nGc9zXmk8rI-xSgkuRqq_lGrQrZPYoPzIWvvInMpizz8WlDi15jLdhg==\"\u003eLooker security features\u003c/a\u003e\n \u003c/div\u003e\n\u003c/div\u003e\n",
"sdk_blob": null
},
"source_flagging_uris": null,
"web_search_queries": [
"Looker data security compliance",
"Looker security features",
"Looker certifications"
]
},
"index": 0,
"logprobs_result": null,
"safety_ratings": null,
"token_count": null,
"url_context_metadata": null
}
],
"create_time": null,
"model_version": "gemini-2.5-flash",
"parsed": null,
"prompt_feedback": null,
"response_id": "FVyMad_CMtGInsEP5bnUGA",
"sdk_http_response": {
"body": null,
"headers": {
"alt-svc": "h3=\":443\"; ma=2592000,h3-29=\":443\"; ma=2592000",
"content-encoding": "gzip",
"content-type": "application/json; charset=UTF-8",
"date": "Wed, 11 Feb 2026 10:38:13 GMT",
"server": "scaffolding on HTTPServer2",
"server-timing": "gfet4t7; dur=7633",
"transfer-encoding": "chunked",
"vary": "Origin, X-Origin, Referer",
"x-content-type-options": "nosniff",
"x-frame-options": "SAMEORIGIN",
"x-xss-protection": "0"
}
},
"usage_metadata": {
"cache_tokens_details": null,
"cached_content_token_count": null,
"candidates_token_count": 532,
"candidates_tokens_details": null,
"prompt_token_count": 70,
"prompt_tokens_details": [
{
"modality": "TEXT",
"token_count": 70
}
],
"thoughts_token_count": 497,
"tool_use_prompt_token_count": 438,
"tool_use_prompt_tokens_details": [
{
"modality": "TEXT",
"token_count": 438
}
],
"total_token_count": 1537,
"traffic_type": null
}
},
"request_payload": {
"input": {
"contents": "You are answering a user query. Be concise but helpful.\nIf you mention products or brands, be specific.\nDo not invent facts. If unsure, say you are unsure.\n\nBrand under analysis: Metabase\nBrand website: https://www.metabase.com\n\nUser query: How does Looker ensure data security compliance?",
"model": "gemini-2.5-flash"
},
"model": "gemini-2.5-flash",
"provider": "gemini"
},
"retry_policy": {
"base_backoff_s": 0.6,
"max_retries": 3,
"timeout_s": 60
},
"usage": {
"cost_usd": 0.001351,
"input_tokens": 70,
"model": "gemini-2.5-flash",
"output_tokens": 532,
"pricing_source": "local_price_table_v1",
"provider": "gemini",
"total_tokens": 1537
},
"usage_raw": {
"cache_tokens_details": null,
"cached_content_token_count": null,
"candidates_token_count": 532,
"candidates_tokens_details": null,
"prompt_token_count": 70,
"prompt_tokens_details": [
{
"modality": "TEXT",
"token_count": 70
}
],
"thoughts_token_count": 497,
"tool_use_prompt_token_count": 438,
"tool_use_prompt_tokens_details": [
{
"modality": "TEXT",
"token_count": 438
}
],
"total_token_count": 1537,
"traffic_type": null
}
}
What was sent to the model?
{
"input": {
"contents": "You are answering a user query. Be concise but helpful.\nIf you mention products or brands, be specific.\nDo not invent facts. If unsure, say you are unsure.\n\nBrand under analysis: Metabase\nBrand website: https://www.metabase.com\n\nUser query: How does Looker ensure data security compliance?",
"model": "gemini-2.5-flash"
},
"model": "gemini-2.5-flash",
"provider": "gemini"
}
Error json
null