Memorystore roles and permissions

This page lists the IAM roles and permissions for Memorystore. To search through all roles and permissions, see the role and permission index.

Memorystore roles

Role Permissions

(roles/memorystore.admin)

Full access to Memorystore resources.

memorystore.*

  • memorystore.backupCollections.get
  • memorystore.backupCollections.list
  • memorystore.backups.delete
  • memorystore.backups.export
  • memorystore.backups.get
  • memorystore.backups.list
  • memorystore.instances.backup
  • memorystore.instances.connect
  • memorystore.instances.create
  • memorystore.instances.delete
  • memorystore.instances.get
  • memorystore.instances.list
  • memorystore.instances.update
  • memorystore.locations.get
  • memorystore.locations.list
  • memorystore.operations.cancel
  • memorystore.operations.delete
  • memorystore.operations.get
  • memorystore.operations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/memorystore.viewer)

Readonly access to Memorystore resources.

memorystore.backupCollections.*

  • memorystore.backupCollections.get
  • memorystore.backupCollections.list

memorystore.backups.get

memorystore.backups.list

memorystore.instances.get

memorystore.instances.list

memorystore.locations.*

  • memorystore.locations.get
  • memorystore.locations.list

memorystore.operations.get

memorystore.operations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/memorystore.dbConnectionUser)

Access to connecting to Memorystore Server db.

memorystore.instances.connect

Service agent roles

Service agent roles should only be granted to service agents.

Role Permissions

(roles/memorystore.serviceAgent)

Gives Cloud Memorystore service account access to managed resource

compute.globalOperations.get

compute.networkAttachments.get

compute.networkAttachments.update

compute.networks.addPeering

compute.networks.get

compute.networks.removePeering

compute.projects.get

compute.routes.get

compute.routes.list

compute.subnetworks.get

compute.subnetworks.list

compute.subnetworks.use

monitoring.metricDescriptors.create

monitoring.metricDescriptors.get

monitoring.metricDescriptors.list

monitoring.monitoredResourceDescriptors.*

  • monitoring.monitoredResourceDescriptors.get
  • monitoring.monitoredResourceDescriptors.list

monitoring.timeSeries.create

resourcemanager.projects.get

resourcemanager.projects.list

telemetry.metrics.write

Memorystore permissions

Permission Included in roles

Owner (roles/owner)

Editor (roles/editor)

Viewer (roles/viewer)

Memorystore Admin (roles/memorystore.admin)

Memorystore Viewer (roles/memorystore.viewer)

Data Scientist (roles/iam.dataScientist)

Databases Admin (roles/iam.databasesAdmin)

Support User (roles/iam.supportUser)

Owner (roles/owner)

Editor (roles/editor)

Viewer (roles/viewer)

Security Admin (roles/iam.securityAdmin)

Security Reviewer (roles/iam.securityReviewer)

Memorystore Admin (roles/memorystore.admin)

Memorystore Viewer (roles/memorystore.viewer)

Data Scientist (roles/iam.dataScientist)

Databases Admin (roles/iam.databasesAdmin)

Security Auditor (roles/iam.securityAuditor)

Support User (roles/iam.supportUser)

Owner (roles/owner)

Editor (roles/editor)

Memorystore Admin (roles/memorystore.admin)

Databases Admin (roles/iam.databasesAdmin)

Owner (roles/owner)

Editor (roles/editor)

Memorystore Admin (roles/memorystore.admin)

Databases Admin (roles/iam.databasesAdmin)

Owner (roles/owner)

Editor (roles/editor)

Viewer (roles/viewer)

Memorystore Admin (roles/memorystore.admin)

Memorystore Viewer (roles/memorystore.viewer)

Data Scientist (roles/iam.dataScientist)

Databases Admin (roles/iam.databasesAdmin)

Support User (roles/iam.supportUser)

Owner (roles/owner)

Editor (roles/editor)

Viewer (roles/viewer)

Security Admin (roles/iam.securityAdmin)

Security Reviewer (roles/iam.securityReviewer)

Memorystore Admin (roles/memorystore.admin)

Memorystore Viewer (roles/memorystore.viewer)

Data Scientist (roles/iam.dataScientist)

Databases Admin (roles/iam.databasesAdmin)

Security Auditor (roles/iam.securityAuditor)

Support User (roles/iam.supportUser)

Owner (roles/owner)

Editor (roles/editor)

Memorystore Admin (roles/memorystore.admin)

Databases Admin (roles/iam.databasesAdmin)

Owner (roles/owner)

Editor (roles/editor)

Memorystore Admin (roles/memorystore.admin)

Data Scientist (roles/iam.dataScientist)

Databases Admin (roles/iam.databasesAdmin)

Memorystore DB Connector User (roles/memorystore.dbConnectionUser)

Owner (roles/owner)

Editor (roles/editor)

Memorystore Admin (roles/memorystore.admin)

Databases Admin (roles/iam.databasesAdmin)

Owner (roles/owner)

Editor (roles/editor)

Memorystore Admin (roles/memorystore.admin)

Databases Admin (roles/iam.databasesAdmin)

Owner (roles/owner)

Editor (roles/editor)

Viewer (roles/viewer)

Memorystore Admin (roles/memorystore.admin)

Memorystore Viewer (roles/memorystore.viewer)

Data Scientist (roles/iam.dataScientist)

Databases Admin (roles/iam.databasesAdmin)

Support User (roles/iam.supportUser)

Owner (roles/owner)

Editor (roles/editor)

Viewer (roles/viewer)

Security Admin (roles/iam.securityAdmin)

Security Reviewer (roles/iam.securityReviewer)

Memorystore Admin (roles/memorystore.admin)

Memorystore Viewer (roles/memorystore.viewer)

Data Scientist (roles/iam.dataScientist)

Databases Admin (roles/iam.databasesAdmin)

Security Auditor (roles/iam.securityAuditor)

Support User (roles/iam.supportUser)

Owner (roles/owner)

Editor (roles/editor)

Memorystore Admin (roles/memorystore.admin)

Databases Admin (roles/iam.databasesAdmin)

Owner (roles/owner)

Editor (roles/editor)

Viewer (roles/viewer)

Memorystore Admin (roles/memorystore.admin)

Memorystore Viewer (roles/memorystore.viewer)

Data Scientist (roles/iam.dataScientist)

Databases Admin (roles/iam.databasesAdmin)

Support User (roles/iam.supportUser)

Owner (roles/owner)

Editor (roles/editor)

Viewer (roles/viewer)

Security Admin (roles/iam.securityAdmin)

Security Reviewer (roles/iam.securityReviewer)

Memorystore Admin (roles/memorystore.admin)

Memorystore Viewer (roles/memorystore.viewer)

Data Scientist (roles/iam.dataScientist)

Databases Admin (roles/iam.databasesAdmin)

Security Auditor (roles/iam.securityAuditor)

Support User (roles/iam.supportUser)

Owner (roles/owner)

Editor (roles/editor)

Memorystore Admin (roles/memorystore.admin)

Databases Admin (roles/iam.databasesAdmin)

Owner (roles/owner)

Editor (roles/editor)

Memorystore Admin (roles/memorystore.admin)

Databases Admin (roles/iam.databasesAdmin)

Owner (roles/owner)

Editor (roles/editor)

Viewer (roles/viewer)

Memorystore Admin (roles/memorystore.admin)

Memorystore Viewer (roles/memorystore.viewer)

Data Scientist (roles/iam.dataScientist)

Databases Admin (roles/iam.databasesAdmin)

Support User (roles/iam.supportUser)

Owner (roles/owner)

Editor (roles/editor)

Viewer (roles/viewer)

Security Admin (roles/iam.securityAdmin)

Security Reviewer (roles/iam.securityReviewer)

Memorystore Admin (roles/memorystore.admin)

Memorystore Viewer (roles/memorystore.viewer)

Data Scientist (roles/iam.dataScientist)

Databases Admin (roles/iam.databasesAdmin)

Security Auditor (roles/iam.securityAuditor)

Support User (roles/iam.supportUser)