Create a Secure Agent role and service account to grant the agent permissions to create and manage an advanced cluster on Google Cloud. You can include the master node and worker node permissions in the Secure Agent role, or you can create separate roles and service accounts for the cluster nodes.
Create the following roles and Google service accounts:
•Secure Agent role and service account
•Optionally, a master node role and service account
•Optionally, a worker node role and service account
A Google Cloud service account is always linked to a Google Cloud project. Make sure that you use only one set of credentials for both the source and target when you run an advanced job.
Create a Secure Agent role and service account
Create a Secure Agent role and service account to grant permissions to the Secure Agent.
Create a Secure Agent role
Create a Secure Agent role to define the set of permissions for the Secure Agent.
1In the Google Cloud web console, navigate to IAM & Admin > Roles.
2Create a role.
3Enter a role title, description, and ID.
You can use <username-agent-role> as a format for the ID.
Optionally, you can create a separate master role and service account to reduce the number of permissions that are assigned to the Secure Agent role. The master role will grant the permissions only to the master node.
Create a master role
Create a master role to define the set of permissions for the master node.
1In the Google Cloud web console, navigate to IAM & Admin > Roles.
2Create a role.
3Enter a role title, description, and ID.
You can use <username-master-role> as a format for the ID.
4Add permissions to the role.
The following table describes the permissions that the role needs:
Operations
Permissions
- Scale up or down an instance group for worker nodes
Create a master service account that uses the master role.
1In the Google Cloud web console, navigate to IAM & Admin > Service Accounts.
2Create a service account.
3Enter service account details such as name, ID, and description.
4Enter details for the service account access to the project.
5Select the master role <username-master-role>.
Create a worker node role and service account
Optionally, you can create a separate worker node role and service account to reduce the number of permissions that are assigned to the Secure Agent role. The worker role will grant the permissions only to the worker nodes.
Create a worker role
Create a worker role to define the set of permissions for the worker nodes.
1In the Google Cloud web console, navigate to IAM & Admin > Roles.
2Create a role.
3Enter a role title, description, and ID.
You can use <username-worker-role> as a format for the ID.
4Add permissions to the role.
The following table describes the permissions that the role needs:
Operations
Permissions
- Upload initialization script notification to the staging location
- Upload initialization script logs to the log location