- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
A service account is a special Google account that belongs to an application or a VM, instead of to an individual end-user. The application uses the service account to call the service’s Google API so that users aren’t directly involved. It’s recommended not to use admin roles for ServiceAccount.
User-managed (and not user-created) default service accounts have the Editor
(roles/editor
) role assigned to them to support GCP services they offer. By default, there are no roles assigned to user-managed, user-created service accounts.
Service accounts represent service-level security of the Resources (application or a VM) which can be determined by the roles assigned to it. Enrolling ServiceAccount with Admin rights gives full access to an assigned application or a VM. A ServiceAccount Access holder can perform critical actions like delete, update, and change settings, etc. without user intervention. For this reason, Datadog recommends that service accounts not have an Admin role.
Removing *Admin or *admin
, Editor
, or Owner
role assignments from service accounts may break functionality that uses impacted service accounts. Required role(s) should be assigned to impacted service accounts in order to restore broken functionality.
IAM & admin/IAM
using https://console.cloud.google.com/iam-admin/iamMembers
User-Managed user created service account(s)
with roles containing *Admin or *admin
, roles matching Editor
, or roles matching Owner
.Delete bin
icon to remove the role from the member (service account in this case)gcloud projects get-iam-policy PROJECT_ID --format json > iam.json
Using a text editor, Remove any Role
which contains roles/ *Admin
or roles/ *admin
, or
matches roles/editor
or roles/owner
. Add a role to the bindings array that defines the group members and the role for those members.
Update the project’s IAM policy:
gcloud projects set-iam-policy PROJECT_ID iam.json