Stay organized with collections Save and categorize content based on your preferences.
gcloud beta access-context-manager perimeters dry-run create
(PERIMETER
: --policy
=POLICY
) (--access-levels
=[access_levels
,…] --egress-policies
=YAML_FILE
--ingress-policies
=YAML_FILE
--resources
=[resources
,…] --restricted-services
=[restricted_services
,…] --enable-vpc-accessible-services
--vpc-allowed-services
=[vpc_allowed_services
,…] | [--perimeter-title
=PERIMETER_TITLE
--perimeter-type
=PERIMETER_TYPE
: --perimeter-access-levels
=[access_levels
,…] --perimeter-description
=PERIMETER_DESCRIPTION
--perimeter-egress-policies
=YAML_FILE
--perimeter-ingress-policies
=YAML_FILE
--perimeter-resources
=[resources
,…] --perimeter-restricted-services
=[restricted_services
,…] --perimeter-enable-vpc-accessible-services
--perimeter-vpc-allowed-services
=[vpc_allowed_services
,…]]) [--async
] [GCLOUD_WIDE_FLAG …
]
(BETA)
When a Service Perimeter with the specified name does not exist, a new Service Perimeter will be created. In this case, the newly created Service Perimeter will not have any enforcement mode configuration, and, therefore, all policy violations will be logged.
When a perimeter with the specified name does exist, a dry-run mode configuration will be created for it. The behavior of the enforcement mode configuration, if present, will not be impacted in this case. Requests that violate the existing enforcement mode configuration of the Service Perimeter will continue being denied. Requests that only violate the policy in the dry-run mode configuration will be logged but will not be denied.
gcloud beta access-context-manager perimeters dry-run create my-perimeter --resources="projects/0123456789" --access-levels="accessPolicies/a_policy/accessLevels/a_level" --restricted-services="storage.googleapis.com"
To create a dry-run configuration for a new Service Perimeter:
gcloud beta access-context-manager perimeters dry-run create my-perimeter --perimeter-title="My New Perimeter" --perimeter-description="Perimeter description" --perimeter-type="regular" --perimeter-resources="projects/0123456789" --perimeter-access-levels="accessPolicies/a_policy/accessLevels/a_level" --perimeter-restricted-services="storage.googleapis.com"
This must be specified.
PERIMETER
To set the perimeter
attribute:
perimeter
on the command line.This positional argument must be specified if any of the other arguments in this group are specified.
--policy
=POLICY
To set the policy
attribute:
perimeter
on the command line with a fully specified name;--policy
on the command line;access_context_manager/policy
.--access-levels
=[access_levels
,…]
--egress-policies
=YAML_FILE
--ingress-policies
=YAML_FILE
--resources
=[resources
,…]
projects/<projectnumber>
) in this perimeter.
--restricted-services
=[restricted_services
,…]
does
apply (for example, storage.googleapis.com
).
--enable-vpc-accessible-services
vpc-allowed-services
list.
--vpc-allowed-services
=[vpc_allowed_services
,…]
--perimeter-title
=PERIMETER_TITLE
This flag argument must be specified if any of the other arguments in this group are specified.
--perimeter-type
=PERIMETER_TYPE
A *regular* perimeter allows resources within this service perimeter to import and export data amongst themselves. A project may belong to at most one regular service perimeter.
A *bridge* perimeter allows resources in different regular service perimeters to import and export data between each other. A project may belong to multiple bridge service perimeters (only if it also belongs to a regular service perimeter). Both restricted and unrestricted service lists, as well as access level lists, must be empty.
This flag argument must be specified if any of the other arguments in this group are specified.
--perimeter-access-levels
=[access_levels
,…]
--perimeter-description
=PERIMETER_DESCRIPTION
--perimeter-egress-policies
=YAML_FILE
--perimeter-ingress-policies
=YAML_FILE
--perimeter-resources
=[resources
,…]
projects/<projectnumber>
) in this perimeter.
--perimeter-restricted-services
=[restricted_services
,…]
does
apply (for example, storage.googleapis.com
).
--perimeter-enable-vpc-accessible-services
vpc-allowed-services
list.
--perimeter-vpc-allowed-services
=[vpc_allowed_services
,…]
--async
--access-token-file
, --account
, --billing-project
, --configuration
, --flags-file
, --flatten
, --format
, --help
, --impersonate-service-account
, --log-http
, --project
, --quiet
, --trace-token
, --user-output-enabled
, --verbosity
.
Run $ gcloud help
for details.
gcloud access-context-manager perimeters dry-run create
gcloud alpha access-context-manager perimeters dry-run create
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-07-22 UTC.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-07-22 UTC."],[],[]]
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4