A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://cloud.google.com/assured-workloads/docs/restrict-resource-usage below:

Restrict resource usage for workloads | Assured Workloads

Stay organized with collections Save and categorize content based on your preferences.

Restrict resource usage for workloads

This page explains how to enable or disable restrictions for non-compliant resources in Assured Workloads folders. By default, each folder's control package determines which products are supported, thus determining which resources can be used. This functionality is enforced by the gcp.restrictServiceUsage organization policy constraint that is automatically applied on the folder when it is created.

Before you begin Required IAM roles

To modify resource usage restrictions, the caller must be granted Identity and Access Management (IAM) permissions using either a predefined role that includes a wider set of permissions, or a custom role that is restricted to the minimum necessary permissions.

The following permissions are required on the target workload:

These permissions are included in the following two roles:

See IAM roles for more information about roles for Assured Workloads.

Enable resource usage restrictions

To enable resource usage restriction for a workload, run the following command. This command applies restrictions on the Assured Workloads folder in accordance with the control package's supported services:

curl  -d '{ "restrictionType": "ALLOW_COMPLIANT_RESOURCES" }' \
      -H "Content-Type: application/json" \
      -H "Authorization: Bearer TOKEN"   -X POST \
      "SERVICE_ENDPOINT/v1/organizations/ORGANIZATION_ID/locations/WORKLOAD_LOCATION/workloads/WORKLOAD_ID:restrictAllowedServices"

Replace the following placeholder values with your own:

After you replace the placeholder values, your request should look similar to the following example:

curl  -d '{ "restrictionType": "ALLOW_COMPLIANT_RESOURCES" }' \
      -H "Content-Type: application/json" \
      -H "Authorization: Bearer ya29.a0AfB_byDnQW7A2Vr5...tanw0427"   -X POST \
      "https://us-central1-assuredworkloads.googleapis.com/v1/organizations/12321311/locations/us-central1/workloads/00-c25febb1-f3c1-4f19-8965-a25:restrictAllowedServices"

If successful, the response will be empty.

Disable resource usage restriction

To disable resource usage restriction for a workload, run the following command. This command effectively removes all service and resource restrictions on the Assured Workloads folder:

curl  -d '{ "restrictionType": "ALLOW_ALL_GCP_RESOURCES" }' \
      -H "Content-Type: application/json" \
      -H "Authorization: Bearer TOKEN"   -X POST \
      "SERVICE_ENDPOINT/v1/organizations/ORGANIZATION_ID/locations/WORKLOAD_LOCATION/workloads/WORKLOAD_ID:restrictAllowedServices"

Replace the following placeholder values with your own:

After you replace the placeholder values, your request should look similar to the following example:

curl  -d '{ "restrictionType": "ALLOW_ALL_GCP_RESOURCES" }' \
      -H "Content-Type: application/json" \
      -H "Authorization: Bearer ya29.a0AfB_byDnQW7A2Vr5...tanw0427"   -X POST \
      "https://us-central1-assuredworkloads.googleapis.com/v1/organizations/12321311/locations/us-central1/workloads/00-c25febb1-f3c1-4f19-8965-a25:restrictAllowedServices"

If successful, the response will be empty.

Supported and unsupported products

The tables in this section include supported and unsupported products for various control packages. If you enable the default resource usage restrictions, then only the supported products can be used. If you disable resource usage restrictions, then both supported and unsupported products can be used.

Data Boundary for FedRAMP Moderate Endpoint Supported products Unsupported products aiplatform.googleapis.com Vertex AI AI Platform Training and Prediction API Data Boundary for FedRAMP High Endpoint Supported products Unsupported products compute.googleapis.com Compute Engine Persistent Disk AI Platform Training and Prediction API Cloud CDN Virtual Private Cloud Cloud Interconnect Cloud Load Balancing Cloud NAT Cloud Router Cloud VPN Google Cloud Armor Network Service Tiers Data Boundary for Criminal Justice Information Services (CJIS) Endpoint Supported products Unsupported products accesscontextmanager.googleapis.com VPC Service Controls Access Context Manager compute.googleapis.com Virtual Private Cloud Persistent Disk Compute Engine Cloud CDN Cloud Interconnect Cloud Load Balancing Cloud NAT Cloud Router Cloud VPN Google Cloud Armor Network Service Tiers cloudkms.googleapis.com Cloud Key Management Service Cloud HSM Data Boundary for Impact Level 4 (IL4) Endpoint Supported products Unsupported products compute.googleapis.com Compute Engine Persistent Disk AI Platform Training and Prediction API Cloud CDN Virtual Private Cloud Cloud Interconnect Cloud Load Balancing Cloud NAT Cloud Router Cloud VPN Google Cloud Armor Network Service Tiers cloudkms.googleapis.com Cloud Key Management Service Cloud HSM US Data Boundary and Support Endpoint Supported products Unsupported products accesscontextmanager.googleapis.com VPC Service Controls Access Context Manager compute.googleapis.com Virtual Private Cloud Persistent Disk Compute Engine Cloud CDN Cloud Interconnect Cloud Load Balancing Cloud NAT Cloud Router Cloud VPN Google Cloud Armor Network Service Tiers cloudkms.googleapis.com Cloud Key Management Service Cloud HSM Service endpoints

This section lists the API endpoints that aren't blocked after you enable resource usage restriction.

API name Endpoint URL Cloud Asset API cloudasset.googleapis.com Cloud Logging API logging.googleapis.com Service Control servicecontrol.googleapis.com Cloud Monitoring API monitoring.googleapis.com Google Cloud Observability stackdriver.googleapis.com Security Token Service API sts.googleapis.com Identity and Access Management API iam.googleapis.com Cloud Resource Manager API cloudresourcemanager.googleapis.com Advisory Notifications API advisorynotifications.googleapis.com IAM Service Account Credentials API iamcredentials.googleapis.com Organization Policy Service API orgpolicy.googleapis.com Policy Troubleshooter API policytroubleshooter.googleapis.com Network Telemetry API networktelemetry.googleapis.com Service Usage API serviceusage.googleapis.com Service Networking API servicenetworking.googleapis.com Cloud Billing API cloudbilling.googleapis.com Service Management API servicemanagement.googleapis.com Identity Toolkit API identitytoolkit.googleapis.com Access Context Manager API accesscontextmanager.googleapis.com Service Consumer Management API serviceconsumermanagement.googleapis.com What's next

Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2025-07-09 UTC.

[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-07-09 UTC."],[[["This document explains how to enable or disable resource usage restrictions for non-compliant resources in Assured Workloads folders, which is enforced by the `gcp.restrictServiceUsage` organization policy constraint."],["To modify resource usage restrictions, users need specific IAM permissions, such as `assuredworkloads.workload.update` and `orgpolicy.policy.set`, typically granted through the \"Assured Workloads Administrator\" or \"Assured Workloads Editor\" roles."],["Resource usage restrictions can be enabled to allow only compliant resources based on the control package's supported services or disabled to allow all GCP resources, using specific curl commands and replacing placeholder values with the user's unique token, service endpoint, organization ID, workload location, and workload ID."],["Different control packages (FedRAMP Moderate, FedRAMP High, CJIS, IL4, US Regions) have different supported and unsupported products, which are detailed in tables within this document."],["Certain API endpoints remain accessible even when resource usage restrictions are enabled, including Cloud Asset API, Cloud Logging API, Service Control, Cloud Monitoring API, and others as listed."]]],[]]


RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4