You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/dyn/compute_alpha.regionInstances.html
+3-2Lines changed: 3 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -259,7 +259,7 @@ <h3>Method Details</h3>
259
259
"natIP": "A String", # Applies to accessConfigs (IPv4) only. An external IP address associated with this instance. Specify an unused static external IP address available to the project or leave this field undefined to use an IP from a shared ephemeral IP address pool. If you specify a static external IP address, it must live in the same region as the zone of the instance.
260
260
"networkTier": "A String", # This signifies the networking tier used for configuring this access configuration and can only take the following values: PREMIUM, STANDARD. If an AccessConfig is specified without a valid external IP address, an ephemeral IP will be created with this networkTier. If an AccessConfig with a valid external IP address is specified, it must match that of the networkTier associated with the Address resource owning that IP.
261
261
"publicDnsName": "A String", # [Output Only] The public DNS domain name for the instance.
262
-
"publicPtrDomainName": "A String", # The DNS domain name for the public PTR record. You can set this field only if the `setPublicPtr` field is enabled in accessConfig. If this field is unspecified in ipv6AccessConfig, a default PTR record will be createc for first IP in associated external IPv6 range.
262
+
"publicPtrDomainName": "A String", # The DNS domain name for the public PTR record. You can set this field only if the `setPublicPtr` field is enabled in accessConfig. If this field is unspecified in ipv6AccessConfig, a default PTR record will be created for first IP in associated external IPv6 range.
263
263
"securityPolicy": "A String", # [Output Only] The resource URL for the security policy associated with this access config.
264
264
"setPublicDns": True or False, # Specifies whether a public DNS 'A' record should be created for the external IP address of this access configuration.
265
265
"setPublicPtr": True or False, # Specifies whether a public DNS 'PTR' record should be created to map the external IP address of the instance to a DNS domain name. This field is not used in ipv6AccessConfig. A default PTR record will be created if the VM has external IPv6 range associated.
@@ -284,7 +284,7 @@ <h3>Method Details</h3>
284
284
"natIP": "A String", # Applies to accessConfigs (IPv4) only. An external IP address associated with this instance. Specify an unused static external IP address available to the project or leave this field undefined to use an IP from a shared ephemeral IP address pool. If you specify a static external IP address, it must live in the same region as the zone of the instance.
285
285
"networkTier": "A String", # This signifies the networking tier used for configuring this access configuration and can only take the following values: PREMIUM, STANDARD. If an AccessConfig is specified without a valid external IP address, an ephemeral IP will be created with this networkTier. If an AccessConfig with a valid external IP address is specified, it must match that of the networkTier associated with the Address resource owning that IP.
286
286
"publicDnsName": "A String", # [Output Only] The public DNS domain name for the instance.
287
-
"publicPtrDomainName": "A String", # The DNS domain name for the public PTR record. You can set this field only if the `setPublicPtr` field is enabled in accessConfig. If this field is unspecified in ipv6AccessConfig, a default PTR record will be createc for first IP in associated external IPv6 range.
287
+
"publicPtrDomainName": "A String", # The DNS domain name for the public PTR record. You can set this field only if the `setPublicPtr` field is enabled in accessConfig. If this field is unspecified in ipv6AccessConfig, a default PTR record will be created for first IP in associated external IPv6 range.
288
288
"securityPolicy": "A String", # [Output Only] The resource URL for the security policy associated with this access config.
289
289
"setPublicDns": True or False, # Specifies whether a public DNS 'A' record should be created for the external IP address of this access configuration.
290
290
"setPublicPtr": True or False, # Specifies whether a public DNS 'PTR' record should be created to map the external IP address of the instance to a DNS domain name. This field is not used in ipv6AccessConfig. A default PTR record will be created if the VM has external IPv6 range associated.
@@ -383,6 +383,7 @@ <h3>Method Details</h3>
383
383
"preemptible": True or False, # Defines whether the instance is preemptible. This can only be set during instance creation or while the instance is stopped and therefore, in a `TERMINATED` state. See Instance Life Cycle for more information on the possible instance states.
384
384
"provisioningModel": "A String", # Specifies the provisioning model of the instance.
385
385
"terminationTime": "A String", # Specifies the timestamp, when the instance will be terminated, in RFC3339 text format. If specified, the instance termination action will be performed at the termination time.
386
+
"windowsLicenseOptimizationMode": "A String", # Represents the Windows Server License Optimization Mode of the VM. If unspecified, the default mode is `OFF`.
386
387
},
387
388
"secureTags": [ # [Input Only] Secure tags to apply to this instance. Maximum number of secure tags allowed is 50. Note that for MachineImage, this is not supported yet.
Copy file name to clipboardExpand all lines: docs/dyn/compute_alpha.regionSecurityPolicies.html
+32Lines changed: 32 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -601,8 +601,15 @@ <h3>Method Details</h3>
601
601
{
602
602
"attachmentId": "A String", # The resource that the security policy is attached to.
603
603
"displayName": "A String", # [Output Only] The display name of the security policy of the association.
604
+
"excludedFolders": [ # A list of folders to exclude from the security policy.
605
+
"A String",
606
+
],
607
+
"excludedProjects": [ # A list of projects to exclude from the security policy.
608
+
"A String",
609
+
],
604
610
"name": "A String", # The name for an association.
605
611
"securityPolicyId": "A String", # [Output Only] The security policy ID of the association.
612
+
"shortName": "A String", # [Output Only] The short name of the security policy of the association.
606
613
},
607
614
],
608
615
"cloudArmorConfig": { # Configuration options for Cloud Armor.
@@ -800,6 +807,7 @@ <h3>Method Details</h3>
800
807
],
801
808
"selfLink": "A String", # [Output Only] Server-defined URL for the resource.
802
809
"selfLinkWithId": "A String", # [Output Only] Server-defined URL for this resource with the resource id.
810
+
"shortName": "A String", # User-provided name of the organization security policy. The name should be unique in the organization in which the security policy is created. This should only be used when SecurityPolicyType is CLOUD_ARMOR. The name must be 1-63 characters long, and comply with https://www.ietf.org/rfc/rfc1035.txt. Specifically, the name must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
803
811
"type": "A String", # The type indicates the intended use of the security policy. - CLOUD_ARMOR: Cloud Armor backend security policies can be configured to filter incoming HTTP requests targeting backend services. They filter requests before they hit the origin servers. - CLOUD_ARMOR_EDGE: Cloud Armor edge security policies can be configured to filter incoming HTTP requests targeting backend services (including Cloud CDN-enabled) as well as backend buckets (Cloud Storage). They filter requests before the request is served from Google's cache. - CLOUD_ARMOR_INTERNAL_SERVICE: Cloud Armor internal service policies can be configured to filter HTTP requests targeting services managed by Traffic Director in a service mesh. They filter requests before the request is served from the application. - CLOUD_ARMOR_NETWORK: Cloud Armor network policies can be configured to filter packets targeting network load balancing resources such as backend services, target pools, target instances, and instances with external IPs. They filter requests before the request is served from the application. This field can be set only at resource creation time.
804
812
"userDefinedFields": [ # Definitions of user-defined fields for CLOUD_ARMOR_NETWORK policies. A user-defined field consists of up to 4 bytes extracted from a fixed offset in the packet, relative to the IPv4, IPv6, TCP, or UDP header, with an optional mask to select certain bits. Rules may then specify matching values for these fields. Example: userDefinedFields: - name: "ipv4_fragment_offset" base: IPV4 offset: 6 size: 2 mask: "0x1fff"
805
813
{
@@ -1058,8 +1066,15 @@ <h3>Method Details</h3>
1058
1066
{
1059
1067
"attachmentId": "A String", # The resource that the security policy is attached to.
1060
1068
"displayName": "A String", # [Output Only] The display name of the security policy of the association.
1069
+
"excludedFolders": [ # A list of folders to exclude from the security policy.
1070
+
"A String",
1071
+
],
1072
+
"excludedProjects": [ # A list of projects to exclude from the security policy.
1073
+
"A String",
1074
+
],
1061
1075
"name": "A String", # The name for an association.
1062
1076
"securityPolicyId": "A String", # [Output Only] The security policy ID of the association.
1077
+
"shortName": "A String", # [Output Only] The short name of the security policy of the association.
1063
1078
},
1064
1079
],
1065
1080
"cloudArmorConfig": { # Configuration options for Cloud Armor.
@@ -1257,6 +1272,7 @@ <h3>Method Details</h3>
1257
1272
],
1258
1273
"selfLink": "A String", # [Output Only] Server-defined URL for the resource.
1259
1274
"selfLinkWithId": "A String", # [Output Only] Server-defined URL for this resource with the resource id.
1275
+
"shortName": "A String", # User-provided name of the organization security policy. The name should be unique in the organization in which the security policy is created. This should only be used when SecurityPolicyType is CLOUD_ARMOR. The name must be 1-63 characters long, and comply with https://www.ietf.org/rfc/rfc1035.txt. Specifically, the name must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
1260
1276
"type": "A String", # The type indicates the intended use of the security policy. - CLOUD_ARMOR: Cloud Armor backend security policies can be configured to filter incoming HTTP requests targeting backend services. They filter requests before they hit the origin servers. - CLOUD_ARMOR_EDGE: Cloud Armor edge security policies can be configured to filter incoming HTTP requests targeting backend services (including Cloud CDN-enabled) as well as backend buckets (Cloud Storage). They filter requests before the request is served from Google's cache. - CLOUD_ARMOR_INTERNAL_SERVICE: Cloud Armor internal service policies can be configured to filter HTTP requests targeting services managed by Traffic Director in a service mesh. They filter requests before the request is served from the application. - CLOUD_ARMOR_NETWORK: Cloud Armor network policies can be configured to filter packets targeting network load balancing resources such as backend services, target pools, target instances, and instances with external IPs. They filter requests before the request is served from the application. This field can be set only at resource creation time.
1261
1277
"userDefinedFields": [ # Definitions of user-defined fields for CLOUD_ARMOR_NETWORK policies. A user-defined field consists of up to 4 bytes extracted from a fixed offset in the packet, relative to the IPv4, IPv6, TCP, or UDP header, with an optional mask to select certain bits. Rules may then specify matching values for these fields. Example: userDefinedFields: - name: "ipv4_fragment_offset" base: IPV4 offset: 6 size: 2 mask: "0x1fff"
1262
1278
{
@@ -1460,8 +1476,15 @@ <h3>Method Details</h3>
1460
1476
{
1461
1477
"attachmentId": "A String", # The resource that the security policy is attached to.
1462
1478
"displayName": "A String", # [Output Only] The display name of the security policy of the association.
1479
+
"excludedFolders": [ # A list of folders to exclude from the security policy.
1480
+
"A String",
1481
+
],
1482
+
"excludedProjects": [ # A list of projects to exclude from the security policy.
1483
+
"A String",
1484
+
],
1463
1485
"name": "A String", # The name for an association.
1464
1486
"securityPolicyId": "A String", # [Output Only] The security policy ID of the association.
1487
+
"shortName": "A String", # [Output Only] The short name of the security policy of the association.
1465
1488
},
1466
1489
],
1467
1490
"cloudArmorConfig": { # Configuration options for Cloud Armor.
@@ -1659,6 +1682,7 @@ <h3>Method Details</h3>
1659
1682
],
1660
1683
"selfLink": "A String", # [Output Only] Server-defined URL for the resource.
1661
1684
"selfLinkWithId": "A String", # [Output Only] Server-defined URL for this resource with the resource id.
1685
+
"shortName": "A String", # User-provided name of the organization security policy. The name should be unique in the organization in which the security policy is created. This should only be used when SecurityPolicyType is CLOUD_ARMOR. The name must be 1-63 characters long, and comply with https://www.ietf.org/rfc/rfc1035.txt. Specifically, the name must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
1662
1686
"type": "A String", # The type indicates the intended use of the security policy. - CLOUD_ARMOR: Cloud Armor backend security policies can be configured to filter incoming HTTP requests targeting backend services. They filter requests before they hit the origin servers. - CLOUD_ARMOR_EDGE: Cloud Armor edge security policies can be configured to filter incoming HTTP requests targeting backend services (including Cloud CDN-enabled) as well as backend buckets (Cloud Storage). They filter requests before the request is served from Google's cache. - CLOUD_ARMOR_INTERNAL_SERVICE: Cloud Armor internal service policies can be configured to filter HTTP requests targeting services managed by Traffic Director in a service mesh. They filter requests before the request is served from the application. - CLOUD_ARMOR_NETWORK: Cloud Armor network policies can be configured to filter packets targeting network load balancing resources such as backend services, target pools, target instances, and instances with external IPs. They filter requests before the request is served from the application. This field can be set only at resource creation time.
1663
1687
"userDefinedFields": [ # Definitions of user-defined fields for CLOUD_ARMOR_NETWORK policies. A user-defined field consists of up to 4 bytes extracted from a fixed offset in the packet, relative to the IPv4, IPv6, TCP, or UDP header, with an optional mask to select certain bits. Rules may then specify matching values for these fields. Example: userDefinedFields: - name: "ipv4_fragment_offset" base: IPV4 offset: 6 size: 2 mask: "0x1fff"
1664
1688
{
@@ -1762,8 +1786,15 @@ <h3>Method Details</h3>
1762
1786
{
1763
1787
"attachmentId": "A String", # The resource that the security policy is attached to.
1764
1788
"displayName": "A String", # [Output Only] The display name of the security policy of the association.
1789
+
"excludedFolders": [ # A list of folders to exclude from the security policy.
1790
+
"A String",
1791
+
],
1792
+
"excludedProjects": [ # A list of projects to exclude from the security policy.
1793
+
"A String",
1794
+
],
1765
1795
"name": "A String", # The name for an association.
1766
1796
"securityPolicyId": "A String", # [Output Only] The security policy ID of the association.
1797
+
"shortName": "A String", # [Output Only] The short name of the security policy of the association.
1767
1798
},
1768
1799
],
1769
1800
"cloudArmorConfig": { # Configuration options for Cloud Armor.
@@ -1961,6 +1992,7 @@ <h3>Method Details</h3>
1961
1992
],
1962
1993
"selfLink": "A String", # [Output Only] Server-defined URL for the resource.
1963
1994
"selfLinkWithId": "A String", # [Output Only] Server-defined URL for this resource with the resource id.
1995
+
"shortName": "A String", # User-provided name of the organization security policy. The name should be unique in the organization in which the security policy is created. This should only be used when SecurityPolicyType is CLOUD_ARMOR. The name must be 1-63 characters long, and comply with https://www.ietf.org/rfc/rfc1035.txt. Specifically, the name must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
1964
1996
"type": "A String", # The type indicates the intended use of the security policy. - CLOUD_ARMOR: Cloud Armor backend security policies can be configured to filter incoming HTTP requests targeting backend services. They filter requests before they hit the origin servers. - CLOUD_ARMOR_EDGE: Cloud Armor edge security policies can be configured to filter incoming HTTP requests targeting backend services (including Cloud CDN-enabled) as well as backend buckets (Cloud Storage). They filter requests before the request is served from Google's cache. - CLOUD_ARMOR_INTERNAL_SERVICE: Cloud Armor internal service policies can be configured to filter HTTP requests targeting services managed by Traffic Director in a service mesh. They filter requests before the request is served from the application. - CLOUD_ARMOR_NETWORK: Cloud Armor network policies can be configured to filter packets targeting network load balancing resources such as backend services, target pools, target instances, and instances with external IPs. They filter requests before the request is served from the application. This field can be set only at resource creation time.
1965
1997
"userDefinedFields": [ # Definitions of user-defined fields for CLOUD_ARMOR_NETWORK policies. A user-defined field consists of up to 4 bytes extracted from a fixed offset in the packet, relative to the IPv4, IPv6, TCP, or UDP header, with an optional mask to select certain bits. Rules may then specify matching values for these fields. Example: userDefinedFields: - name: "ipv4_fragment_offset" base: IPV4 offset: 6 size: 2 mask: "0x1fff"
0 commit comments