Error Reporting 역할 및 권한

이 페이지에는 Error Reporting의 IAM 역할과 권한이 나와 있습니다. 모든 역할과 권한을 검색하려면 역할 및 권한 색인을 참조하세요.

Error Reporting 역할

Role Permissions

(roles/errorreporting.admin)

Provides full access to Error Reporting data.

Lowest-level resources where you can grant this role:

  • Project

cloudnotifications.activities.list

errorreporting.*

  • errorreporting.applications.list
  • errorreporting.errorEvents.create
  • errorreporting.errorEvents.delete
  • errorreporting.errorEvents.list
  • errorreporting.groupMetadata.get
  • errorreporting.groupMetadata.update
  • errorreporting.groups.list

logging.notificationRules.*

  • logging.notificationRules.create
  • logging.notificationRules.delete
  • logging.notificationRules.get
  • logging.notificationRules.list
  • logging.notificationRules.update

resourcemanager.projects.get

resourcemanager.projects.list

stackdriver.projects.get

(roles/errorreporting.user)

Provides the permissions to read and write Error Reporting data, except for sending new error events.

Lowest-level resources where you can grant this role:

  • Project

cloudnotifications.activities.list

errorreporting.applications.list

errorreporting.errorEvents.delete

errorreporting.errorEvents.list

errorreporting.groupMetadata.*

  • errorreporting.groupMetadata.get
  • errorreporting.groupMetadata.update

errorreporting.groups.list

logging.notificationRules.*

  • logging.notificationRules.create
  • logging.notificationRules.delete
  • logging.notificationRules.get
  • logging.notificationRules.list
  • logging.notificationRules.update

resourcemanager.projects.get

resourcemanager.projects.list

stackdriver.projects.get

(roles/errorreporting.viewer)

Provides read-only access to Error Reporting data.

Lowest-level resources where you can grant this role:

  • Project

cloudnotifications.activities.list

errorreporting.applications.list

errorreporting.errorEvents.list

errorreporting.groupMetadata.get

errorreporting.groups.list

logging.notificationRules.get

logging.notificationRules.list

resourcemanager.projects.get

resourcemanager.projects.list

stackdriver.projects.get

(roles/errorreporting.writer)

Provides the permissions to send error events to Error Reporting.

Lowest-level resources where you can grant this role:

  • Service Account

errorreporting.errorEvents.create

Error Reporting 권한

권한 역할에 포함됨

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Hub 운영자(roles/cloudhub.operator)

Error Reporting 관리자(roles/errorreporting.admin)

Error Reporting 사용자(roles/errorreporting.user)

Error Reporting 뷰어(roles/errorreporting.viewer)

보안 관리자(roles/iam.securityAdmin)

보안 검토자(roles/iam.securityReviewer)

소유자(roles/owner)

편집자(roles/editor)

Error Reporting 관리자(roles/errorreporting.admin)

Error Reporting 작성자(roles/errorreporting.writer)

소유자(roles/owner)

편집자(roles/editor)

Error Reporting 관리자(roles/errorreporting.admin)

Error Reporting 사용자(roles/errorreporting.user)

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Hub 운영자(roles/cloudhub.operator)

Error Reporting 관리자(roles/errorreporting.admin)

Error Reporting 사용자(roles/errorreporting.user)

Error Reporting 뷰어(roles/errorreporting.viewer)

보안 관리자(roles/iam.securityAdmin)

보안 검토자(roles/iam.securityReviewer)

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Hub 운영자(roles/cloudhub.operator)

Error Reporting 관리자(roles/errorreporting.admin)

Error Reporting 사용자(roles/errorreporting.user)

Error Reporting 뷰어(roles/errorreporting.viewer)

소유자(roles/owner)

편집자(roles/editor)

Error Reporting 관리자(roles/errorreporting.admin)

Error Reporting 사용자(roles/errorreporting.user)

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Hub 운영자(roles/cloudhub.operator)

Error Reporting 관리자(roles/errorreporting.admin)

Error Reporting 사용자(roles/errorreporting.user)

Error Reporting 뷰어(roles/errorreporting.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

보안 관리자(roles/iam.securityAdmin)

보안 검토자(roles/iam.securityReviewer)