Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Operator Aplikasi (AO) adalah anggota tim pengembangan dalam organisasi Administrator Platform (PA). AOs berinteraksi dengan resource
tingkat project. Anda dapat menetapkan peran bawaan berikut kepada anggota tim:
Developer OCR AI: Mengakses layanan Pengenalan Karakter Optik untuk mendeteksi teks dalam gambar.
Developer Chirp Speech AI: Akses model Chirp dari layanan Speech-to-Text untuk mengenali ucapan dan mentranskripsikan audio.
Developer AI Speech: Akses layanan Speech-to-Text untuk mengenali ucapan dan mentranskripsikan audio.
Developer Embedding Teks AI: Mengakses layanan Text Embedding untuk mengonversi bahasa alami Inggris menjadi vektor numerik.
AI Text Embedding Multilingual Developer: Akses layanan Text Embedding untuk mengonversi bahasa alami multibahasa menjadi vektor numerik.
Developer Terjemahan AI: Mengakses layanan Vertex AI Translation untuk menerjemahkan teks.
Pembuat Cadangan: Membuat cadangan manual dan memulihkan.
Admin Certificate Authority Service: Memiliki akses untuk mengelola Certificate Authority dan permintaan sertifikat di projectnya.
Admin Project Peran Kustom: Membuat dan mengelola peran kustom dalam project.
Editor Dasbor: Memiliki akses baca dan tulis pada resource kustom Dashboard.
Pelihat Dasbor: Memiliki akses hanya baca pada resource kustom Dashboard.
Admin Discovery Engine: Mendapatkan akses penuh ke semua resource Discovery Engine.
Developer Discovery Engine: Mendapatkan akses baca dan tulis ke semua resource Discovery Engine.
Pembaca Discovery Engine: Mendapatkan akses baca ke semua resource Discovery Engine.
Admin Load Balancer Global: Memiliki izin baca dan tulis pada semua resource load balancer di namespace project di server API global.
Admin Instance Harbor: Memiliki akses penuh untuk mengelola instance Harbor dalam project.
Pelihat Instance Harbor: Memiliki akses hanya baca untuk melihat instance Harbor dalam project.
Pembuat Project Harbor: Memiliki akses untuk mengelola project instance Harbor.
Admin Kebijakan Jaringan K8s: Mengelola kebijakan jaringan di cluster pengguna.
Admin KMS: Mengelola kunci KMS dalam project, termasuk kunci AEADKey dan
SigningKey. Peran ini juga dapat mengimpor dan mengekspor kunci.
Kreator KMS: Memiliki akses buat dan baca pada kunci KMS dalam project.
Developer KMS: Memiliki akses untuk melakukan operasi kripto menggunakan kunci di project.
Admin Ekspor Kunci KMS: Memiliki akses untuk mengekspor kunci KMS sebagai kunci yang dienkapsulasi
dari KMS.
Admin Impor Kunci KMS: Memiliki akses untuk mengimpor kunci KMS sebagai kunci yang di-wrap ke KMS.
Pelihat KMS: Memiliki akses hanya baca ke kunci KMS di projectnya, dan dapat melihat impor dan ekspor kunci.
Pembuat LoggingRule: Membuat resource kustom LoggingRule di namespace project.
Editor LoggingRule: Mengedit resource kustom LoggingRule di
namespace project.
LoggingRule Viewer: Melihat resource kustom LoggingRule di
namespace project.
Pembuat LoggingTarget: Membuat resource kustom LoggingTarget di
namespace project.
Editor LoggingTarget: Mengedit resource kustom LoggingTarget di
namespace project.
Pelihat LoggingTarget: Melihat resource kustom LoggingTarget di
namespace project.
Admin Load Balancer: memiliki izin baca dan tulis pada semua resource load balancer di namespace project.
Editor Marketplace: Memiliki akses buat, perbarui, dan hapus pada instance layanan dalam project.
Editor MonitoringRule: Memiliki akses baca dan tulis ke resource MonitoringRule.
MonitoringRule Viewer: Memiliki akses hanya baca ke MonitoringRule
resource kustom.
Editor MonitoringTarget: Memiliki akses baca dan tulis ke resource kustom MonitoringTarget.
Pelihat MonitoringTarget: Memiliki akses hanya baca ke MonitoringTarget
resource kustom.
Admin Namespace: Mengelola semua resource dalam namespace project.
NAT Viewer: Memiliki akses hanya baca ke deployment di cluster pengguna.
Editor ObservabilityPipeline: Memiliki akses baca dan tulis pada
ObservabilityPipeine resource kustom.
ObservabilityPipeline Viewer: Memiliki akses hanya baca pada
resource kustom ObservabilityPipeline.
Project Bucket Admin: Mengelola bucket penyimpanan dan objek dalam bucket.
Admin Objek Bucket Project: Memiliki akses hanya baca pada bucket dalam project, dan akses baca-tulis pada objek dalam bucket tersebut.
Project Bucket Object Viewer: Memiliki akses hanya baca pada bucket dalam project dan objek di bucket tersebut.
Admin IAM Project: Mengelola kebijakan izin IAM project.
Admin NetworkPolicy Project: Mengelola kebijakan jaringan project di
namespace project.
Project DB Admin: Mengelola Layanan Database untuk project.
Project DB Editor: Memiliki akses baca-tulis ke Layanan Database untuk project.
Project DB Viewer: Memiliki akses hanya baca ke Layanan Database untuk project.
Pelihat Project: Memiliki akses hanya baca ke semua resource dalam namespace project.
Project VirtualMachine Admin: Mengelola VM di namespace project.
Project VirtualMachine Image Admin: Mengelola image VM di namespace project.
Admin Secret: Mengelola secret Kubernetes dalam project.
Secret Viewer: Melihat secret Kubernetes dalam project.
Admin Konfigurasi Layanan: Memiliki akses baca dan tulis ke konfigurasi layanan dalam namespace project.
Pelihat Konfigurasi Layanan: Memiliki akses baca ke konfigurasi layanan dalam namespace project.
Admin Project Subnet (global): Mengelola beberapa subnet zona dalam project.
Admin Project Subnet: Mengelola subnet zonal dalam project.
Subnet Project Operator: Mengelola subnet yang dialokasikan otomatis jenis leaf dalam project.
Pengguna Vertex AI Prediction: Mengakses layanan Prediksi Online untuk membuat permintaan ke endpoint model Anda.
Admin Notebook Workbench: Mendapatkan akses baca dan tulis ke semua resource notebook dalam namespace project.
Workbench Notebooks Viewer: Mendapatkan akses hanya baca ke semua resource notebook dalam namespace project dan melihat antarmuka pengguna Vertex AI Workbench.
Pelihat Workload: Memiliki akses baca ke workload dalam project.
Peran umum
Peran umum standar berikut berlaku untuk semua pengguna terautentikasi:
AI Platform Viewer: Memberikan izin untuk melihat layanan terlatih.
Pelihat Opsi DB: Melihat semua opsi konfigurasi yang dapat digunakan di
Layanan Database.
DB UI Viewer: Memberikan izin kepada pengguna yang diautentikasi untuk melihat UI
Database Service.
DNS Suffix Viewer: Mengakses peta konfigurasi akhiran domain name service (DNS).
Admin Log Alur: Memiliki akses baca dan tulis ke semua resource Log Alur.
Flow Log Viewer: Memiliki akses hanya baca ke semua resource Flow Log.
Pelihat Marketplace: Memiliki akses hanya baca pada versi layanan.
Pengguna Kalkulator Harga: Memiliki akses hanya baca ke deskripsi unit penyimpanan stok (SKU).
Project Discovery Viewer: Memiliki akses baca untuk semua pengguna yang diautentikasi ke tampilan project.
Public Image Viewer: Memiliki akses baca untuk semua pengguna yang diautentikasi pada
image VM publik di namespace vm-images.
Pelihat Jenis Virtual Machine: Memiliki akses baca ke jenis virtual machine
cakupan cluster.
VM Type Viewer: Memiliki akses baca ke jenis virtual machine yang telah ditentukan sebelumnya.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-09-04 UTC."],[[["\u003cp\u003eApplication Operators (AOs) are development team members within the Platform Administrator (PA) organization who interact with project-level resources.\u003c/p\u003e\n"],["\u003cp\u003eThere are a wide variety of predefined roles for team members, encompassing AI model access, artifact management, backups, certificate management, and more.\u003c/p\u003e\n"],["\u003cp\u003eRoles exist for managing Kubernetes resources such as secrets, network policies, and custom resources like \u003ccode\u003eDashboard\u003c/code\u003e, \u003ccode\u003eLoggingRule\u003c/code\u003e, and \u003ccode\u003eMonitoringRule\u003c/code\u003e.\u003c/p\u003e\n"],["\u003cp\u003eCommon roles provide broad permissions to all authenticated users, including access to AI Platform, Database Service UI, and pre-defined virtual machine types.\u003c/p\u003e\n"],["\u003cp\u003eDifferent access levels are available within each service, such as Admin, Editor, and Viewer, allowing for granular control over project resources and services.\u003c/p\u003e\n"]]],[],null,["# Predefined role descriptions for AOs\n\nAn Application Operator (AO) is a member of the development team within the\nPlatform Administrator (PA) organization. AOs interact with project-level\nresources. You can assign the following predefined roles to team members:\n\n- **AI OCR Developer**: Access the Optical Character Recognition service to detect text in images.\n- **AI Speech Chirp Developer**: Access the Chirp model of the Speech-to-Text service to recognize speech and transcribe audio.\n- **AI Speech Developer**: Access the Speech-to-Text service to recognize speech and transcribe audio.\n- **AI Text Embedding Developer**: Access the Text Embedding service to convert English natural language into numerical vectors.\n- **AI Text Embedding Multilingual Developer**: Access the Text Embedding service to convert multilingual natural language into numerical vectors.\n- **AI Translation Developer**: Access the Vertex AI Translation service to translate text.\n- **Backup Creator**: Creates manual backups and restores.\n- **Certificate Authority Service Admin**: Has access to manage certificate authorities and certificate requests in their project.\n- **Custom Role Project Admin**: Creates and manages custom roles within a project.\n- **Dashboard Editor** : Has read and write access on `Dashboard` custom resources.\n- **Dashboard Viewer** : Has read-only access on `Dashboard` custom resources.\n- **Discovery Engine Admin**: Get full access to all Discovery Engine resources.\n- **Discovery Engine Developer**: Get read and write access to all Discovery Engine resources.\n- **Discovery Engine Reader**: Get read access to all Discovery Engine resources.\n- **Global Load Balancer Admin**: Has read and write permissions on all load balancer resources in the project namespace in the global API server.\n- **Harbor Instance Admin**: Has full access to manage Harbor instances in a project.\n- **Harbor Instance Viewer**: Has read-only access to view Harbor instances in a project.\n- **Harbor Project Creator**: Has access to manage Harbor instance projects.\n- **K8s Network Policy Admin**: Manages network policies in user clusters.\n- **KMS Admin** : Manages KMS keys in a project, including the `AEADKey` and `SigningKey` keys. This role can also import and export keys.\n- **KMS Creator**: Has create and read access on KMS keys in a project.\n- **KMS Developer**: Has access to perform crypto operations using keys in projects.\n- **KMS Key Export Admin**: Has access to export KMS keys as wrapped keys from the KMS.\n- **KMS Key Import Admin**: Has access to import KMS keys as wrapped keys to the KMS.\n- **KMS Viewer**: Has read-only access to KMS keys in their project, and can view key import and export.\n- **LoggingRule Creator** : Creates `LoggingRule` custom resources in the project namespace.\n- **LoggingRule Editor** : Edits `LoggingRule` custom resources in the project namespace.\n- **LoggingRule Viewer** : Views `LoggingRule` custom resources in the project namespace.\n- **LoggingTarget Creator** : Creates `LoggingTarget` custom resources in the project namespace.\n- **LoggingTarget Editor** : Edits `LoggingTarget` custom resources in the project namespace.\n- **LoggingTarget Viewer** : Views `LoggingTarget` custom resources in the project namespace.\n- **Load Balancer Admin**: has read and write permissions on all load balancer resources in the project namespace.\n- **Marketplace Editor**: Has create, update, and delete access on service instances in a project.\n- **MonitoringRule Editor** : Has read and write access to `MonitoringRule` resources.\n- **MonitoringRule Viewer** : Has read-only access to `MonitoringRule` custom resources.\n- **MonitoringTarget Editor** : Has read and write access to `MonitoringTarget` custom resources.\n- **MonitoringTarget Viewer** : Has read-only access to `MonitoringTarget` custom resources.\n- **Namespace Admin**: Manages all resources within the project namespace.\n- **NAT Viewer**: Has read-only access to deployments in user clusters.\n- **ObservabilityPipeline Editor** : Has read and write access on `ObservabilityPipeine` custom resources.\n- **ObservabilityPipeline Viewer** : Has read-only access on `ObservabilityPipeline` custom resources.\n- **Project Bucket Admin**: Manages the storage buckets and objects within buckets.\n- **Project Bucket Object Admin**: Has read-only access on buckets within a project, and read-write access on the objects in those buckets.\n- **Project Bucket Object Viewer**: Has read-only access on buckets within a project and the objects in those buckets.\n- **Project IAM Admin**: Manages the IAM allow policies of projects.\n- **Project NetworkPolicy Admin:** Manages the project network policies in the project namespace.\n- **Project DB Admin**: Administers Database Service for a project.\n- **Project DB Editor**: Has read-write access to Database Service for a project.\n- **Project DB Viewer**: Has read-only access to Database Service for a project.\n- **Project Viewer:** Has read-only access to all resources within project namespaces.\n- **Project VirtualMachine Admin**: Manages VMs in the project namespace.\n- **Project VirtualMachine Image Admin**: Manages VM images in the project namespace.\n- **Secret Admin**: Manages Kubernetes secrets in projects.\n- **Secret Viewer**: Views Kubernetes secrets in projects.\n- **Service Configuration Admin**: Has read and write access to service configurations within a project namespace.\n- **Service Configuration Viewer**: Has read access to service configurations within a project namespace.\n- **Subnet Project Admin (global)**: Manages multiple zone subnets within projects.\n- **Subnet Project Admin**: Manages zonal subnets within projects.\n- **Subnet Project Operator**: Manages leaf type auto-allocated subnets within projects.\n- **Vertex AI Prediction User**: Access the Online Prediction service to make requests to your model endpoint.\n- **Volume Replication Admin**: Manages volume replication resources.\n- **Workbench Notebooks Admin**: Get read and write access to all notebook resources within a project namespace.\n- **Workbench Notebooks Viewer**: Get read-only access to all notebook resources within a project namespace and view the Vertex AI Workbench user interface.\n- **Workload Viewer**: Has read access to workloads in a project.\n\nCommon roles\n------------\n\nThe following predefined common roles apply to all authenticated users:\n\n- **AI Platform Viewer**: Grants permissions to view pre-trained services.\n- **DB Options Viewer**: Views all configuration options that can be used in Database Service.\n- **DB UI Viewer**: Grants permissions to authenticated users to view the Database Service UI.\n- **DNS Suffix Viewer**: Accesses the domain name service (DNS) suffix config map.\n- **Flow Log Admin**: Has read and write access to all Flow Log resources.\n- **Flow Log Viewer**: Has read-only access to all Flow Log resources.\n- **Marketplace Viewer**: Has read-only access on service versions.\n- **Pricing Calculator User**: Has read-only access to stock keeping unit (SKU) descriptions.\n- **Project Discovery Viewer**: Has read access for all authenticated users to the project view.\n- **Public Image Viewer** : Has read access for all authenticated users on the public VM images in the namespace `vm-images`.\n- **Virtual Machine Type Viewer**: Has read access to cluster-scoped virtual machine types.\n- **VM Type Viewer**: Has read access to the predefined virtual machine types."]]