This page describes service accounts and VM access scopes and how they are used with Dataproc.
What are service accounts?
A service account is a special account that can be used by services and applications running on a Compute Engine virtual machine (VM) instance to interact with other Google Cloud APIs. Applications can use service account credentials to authorize themselves to a set of APIs and perform actions on the VM within the permissions granted to the service account.
Dataproc service accounts
The following service accounts are granted permissions required to perform Dataproc actions in the project where your cluster is located.
Dataproc VM service account: VMs in a Dataproc cluster use this service account for Dataproc data plane operations. The Compute Engine default service account,
project_number-compute@developer.gserviceaccount.com
, is used as the Dataproc VM service account unless you specify a VM service account when you create a cluster. By default, the Compute Engine default service account is granted the Dataproc Worker role, which includes the permissions required for Dataproc data plane operations.Custom service accounts: If you specify a custom service account when you create a cluster, you must grant the custom service account the permissions needed for Dataproc data plane operations. You can do this by assigning the Dataproc Worker role to the service account because this role includes the permissions necessary for Dataproc data plane operations. Additional roles are necessary to grant permissions for other operations, such as reading and writing data to BigQuery (see View and manage IAM service account roles for more information).
Dataproc Service Agent service account: Dataproc creates the Service Agent service account,
service-project_number@dataproc-accounts.iam.gserviceaccount.com
, with the Dataproc Service Agent role in a Dataproc user's Google Cloud project. This service account cannot be replaced by a custom VM service account when you create a cluster. This service agent account is used to perform Dataproc control plane operations, such as the creation, update, and deletion of cluster VMs.
Shared VPC networks: If the cluster uses a Shared VPC network, a Shared VPC Admin must grant the Dataproc Service Agent service account the role of Network User for the Shared VPC host project. For more information, see:
- Create a cluster that uses a VPC network in another project
- Shared VPC documentation: configuring service accounts as Service Project Admins
View and manage IAM service account roles
To view and manage the roles granted to the Dataproc VM service account, do the following:
In the Google Cloud console, go to the IAM page.
Click Include Google-provided role grants.
View the roles listed for the VM service account. The following image shows the required Dataproc Worker role listed for the Compute Engine default service account (
project_number-compute@developer.gserviceaccount.com
) that Dataproc uses by default as the VM service account.You can click the pencil icon displayed on the service account row to grant or remove service account roles.
Dataproc VM access scopes
VM Access scopes and IAM roles work together to limit VM access to Google Cloud
APIs. For example, if cluster VMs are granted only the
https://www.googleapis.com/auth/storage-full
scope, applications running
on cluster VMs can call Cloud Storage APIs, but they are not able to
make requests to BigQuery, even if they are running as a VM service account
that had been granted a BigQuery role with broad permissions.
A best practice
is to grant the broad cloud-platform
scope (https://www.googleapis.com/auth/cloud-platform
)
to VMs, and then limit VM access by granting specific
IAM roles to the VM service account.
Default Dataproc VM scopes. If scopes are not specified when a cluster is created (see gcloud dataproc cluster create --scopes), Dataproc VMs have the following default set of scopes:
https://www.googleapis.com/auth/cloud-platform (clusters created with image version 2.1+
).
https://www.googleapis.com/auth/bigquery
https://www.googleapis.com/auth/bigtable.admin.table
https://www.googleapis.com/auth/bigtable.data
https://www.googleapis.com/auth/cloud.useraccounts.readonly
https://www.googleapis.com/auth/devstorage.full_control
https://www.googleapis.com/auth/devstorage.read_write
https://www.googleapis.com/auth/logging.write
If you specify scopes when creating a cluster, cluster VMs will have the scopes you specify and the following minimum set of required scopes (even if you don't specify them):
https://www.googleapis.com/auth/cloud-platform (clusters created with image version 2.1+
).
https://www.googleapis.com/auth/cloud.useraccounts.readonly
https://www.googleapis.com/auth/devstorage.read_write
https://www.googleapis.com/auth/logging.write
Create a cluster with a custom VM service account
When you create a cluster, you can specify a custom VM service account that your cluster will use for Dataproc data plane operations instead of the default VM service account (you can't change the VM service account after the cluster is created). Using a VM service account with assigned IAM roles allows you to provide your cluster with fine-grained access to project resources.
Preliminary steps
Create the custom VM service account within the project where the cluster will be created.
Grant the custom VM service account the Dataproc Worker role on the project and any additional roles needed by your jobs, such as the BigQuery Reader and Writer roles (see Dataproc permissions and IAM roles).
gcloud CLI example:
- The following sample command grants the custom VM service account in the cluster project the Dataproc Worker role at the project level:
gcloud projects add-iam-policy-binding CLUSTER_PROJECT_ID \ --member=serviceAccount:SERVICE_ACCOUNT_NAME@PROJECT_ID.iam.gserviceaccount.com \ --role="roles/dataproc.worker"
- Consider a custom role: Instead of granting service
account the pre-defined Dataproc
Worker
role, you can grant the service account a custom role that contains Worker role permissions but limits thestorage.objects.*
permissions.- The custom role must at least grant the VM service account
storage.objects.create
,storage.objects.get
, andstorage.objects.update
permissions on the objects in the Dataproc staging and temp buckets and on any additional buckets needed by jobs that will run on the cluster.
- The custom role must at least grant the VM service account
Create the cluster
- Create the cluster in your project.
gcloud Command
Use the gcloud dataproc clusters create command to create a cluster with the custom VM service account.
gcloud dataproc clusters create CLUSTER_NAME \ --region=REGION \ --service-account=SERVICE_ACCOUNT_NAME@PROJECT_ID.iam.gserviceaccount.com \ --scopes=SCOPE
Replace the following:
- CLUSTER_NAME: The cluster name, which must be unique within a project. The name must start with a lowercase letter, and can contain up to 51 lowercase letters, numbers, and hyphens. It cannot end with a hyphen. The name of a deleted cluster can be reused.
- REGION: The region where the cluster will be located.
- SERVICE_ACCOUNT_NAME: The service account name.
- PROJECT_ID: The Google Cloud project ID of the project containing your VM service account. This will be the ID of the project where your cluster will be created or the ID of another project if you are creating a cluster with a custom VM service account in another cluster.
- SCOPE: Access scope(s) for cluster VM instances (for example,
https://www.googleapis.com/auth/cloud-platform
).
REST API
When completing the
GceClusterConfig
as part of the
clusters.create
API request, set the following fields:
serviceAccount
: The service account will be located in the project where your cluster will be created unless you are using a VM service account from a different project.serviceAccountScopes
: Specify the access scope(s) for cluster VM instances (for example,https://www.googleapis.com/auth/cloud-platform
).
Console
Setting a Dataproc VM service account
in the Google Cloud console is not supported. You can set the cloud-platform
access scope on cluster
VMs when you create the cluster by clicking
"Enables the cloud-platform scope for this cluster"
in the Project access section of the Manage security
panel on the Dataproc
Create a cluster
page in the Google Cloud console.
Create a cluster with a custom VM service account from another project
When you create a cluster, you can specify a custom VM service account that your cluster will use for Dataproc data plane operations instead of using the default VM service account (you can't specify a custom VM service account after the cluster is created). Using a custom VM service account with assigned IAM roles allows you to provide your cluster with fine-grained access to project resources.
Preliminary steps
In the service account project (the project where the custom VM service account is located):
Enable the Dataproc API.
Grant to your email account (the user who is creating the cluster) the Service Account User role on either the service account project or, for more granular control, the custom VM service account in the service account project.
For more information: See Manage access to projects, folders, and organizations to grant roles at the project level and Manage access to service accounts grant roles at the service account level.
gcloud CLI examples:
- The following sample command grants to the user the Service Account User role at the project level:
gcloud projects add-iam-policy-binding SERVICE_ACCOUNT_PROJECT_ID \ --member=USER_EMAIL \ --role="roles/iam.serviceAccountUser"
Notes:
USER_EMAIL
: Provide your user account email address, in the format:user:user-name@example.com
.- The following sample command grants to the user the Service Account User role at the service account level:
gcloud iam service-accounts add-iam-policy-binding VM_SERVICE_ACCOUNT_EMAIL \ --member=USER_EMAIL \ --role="roles/iam.serviceAccountUser"
Notes:
USER_EMAIL
: Provide your user account email address, in the format:user:user-name@example.com
.Grant the custom VM service account the Dataproc Worker role on the cluster project.
gcloud CLI example:
gcloud projects add-iam-policy-binding CLUSTER_PROJECT_ID \ --member=serviceAccount:SERVICE_ACCOUNT_NAME@SERVICE_ACCOUNT_PROJECT_ID.iam.gserviceaccount.com \ --role="roles/dataproc.worker"
Grant the Dataproc Service Agent service account in the cluster project the Service Account User and the Service Account Token Creator roles on either the service account project or, for more granular control, the custom VM service account in the service account project. By doing this, you allow the Dataproc service agent service account in the cluster project to create tokens for the custom Dataproc VM service account in the service account project.
For more information: See Manage access to projects, folders, and organizations to grant roles at the project level and Manage access to service accounts grant roles at the service account level.
gcloud CLI examples:
- The following sample commands grant the Dataproc Service Agent service account in the cluster project the Service Account User and Service Account Token Creator roles at the project level:
gcloud projects add-iam-policy-binding SERVICE_ACCOUNT_PROJECT_ID \ --member=serviceAccount:service-CLUSTER_PROJECT_NUMBER@dataproc-accounts.iam.gserviceaccount.com \ --role="roles/iam.serviceAccountUser"
gcloud projects add-iam-policy-binding SERVICE_ACCOUNT_PROJECT_ID \ --member=serviceAccount:service-CLUSTER_PROJECT_NUMBER@dataproc-accounts.iam.gserviceaccount.com \ --role="roles/iam.serviceAccountTokenCreator"
- The following sample commands grant the Dataproc Service Agent service account in the cluster project the Service Account User and Service Account Token Creator roles at the VM service account level:
gcloud iam service-accounts add-iam-policy-binding VM_SERVICE_ACCOUNT_EMAIL \ --member=serviceAccount:service-CLUSTER_PROJECT_NUMBER@dataproc-accounts.iam.gserviceaccount.com \ --role="roles/iam.serviceAccountUser"
gcloud iam service-accounts add-iam-policy-binding VM_SERVICE_ACCOUNT_EMAIL \ --member=serviceAccount:service-CLUSTER_PROJECT_NUMBER@dataproc-accounts.iam.gserviceaccount.com \ --role="roles/iam.serviceAccountTokenCreator"
Grant the Compute Engine Service Agent service account in the cluster project the Service Account Token Creator role on either the service account project or, for more granular control, the custom VM service account in the service account project. By doing this, you grant the Compute Agent Service Agent service account in the cluster project the ability to create tokens for the custom Dataproc VM service account in the service account project.
For more information: See Manage access to projects, folders, and organizations to grant roles at the project level and Manage access to service accounts grant roles at the service account level.
gcloud CLI examples:
- The following sample command grants the Compute Engine Service Agent service account in the cluster project the Service Account Token Creator role at the project level:
gcloud projects add-iam-policy-binding SERVICE_ACCOUNT_PROJECT_ID \ --member=serviceAccount:service-CLUSTER_PROJECT_NUMBER@compute-system.iam.gserviceaccount.com \ --role="roles/iam.serviceAccountTokenCreator"
- The following sample command grants the Compute Engine Service Agent service account in the cluster project the Service Account Token Creator role at the VM service account level:
gcloud iam service-accounts add-iam-policy-binding VM_SERVICE_ACCOUNT_EMAIL \ --member=serviceAccount:service-CLUSTER_PROJECT_NUMBER@compute-system.iam.gserviceaccount.com \ --role="roles/iam.serviceAccountTokenCreator"
Create the cluster
What's next
- Service accounts
- Dataproc permissions and IAM roles
- Dataproc principals and roles
- Dataproc Service Account Based Secure Multi-tenancy
- Dataproc Personal Cluster Authentication
- Dataproc Granular IAM