gcloud container fleet create

NAME
gcloud container fleet create - create a fleet
SYNOPSIS
gcloud container fleet create [--async] [--display-name=DISPLAY_NAME] [--labels=[KEY=VALUE,…]] [--binauthz-evaluation-mode=BINAUTHZ_EVALUATION_MODE --binauthz-policy-bindings=[name=BINAUTHZ_POLICY] --security-posture=SECURITY_POSTURE --workload-vulnerability-scanning=WORKLOAD_VULNERABILITY_SCANNING] [GCLOUD_WIDE_FLAG]
DESCRIPTION
This command can fail for the following reasons:
  • The project specified does not exist.
  • The project specified already has a fleet.
  • The active account does not have permission to access the given project.
EXAMPLES
To create a fleet in project example-foo-bar-1 with display name my-fleet, run:
gcloud container fleet create --display-name=my-fleet --project=example-foo-bar-1
FLAGS
--async
Return immediately, without waiting for the operation in progress to complete.
--display-name=DISPLAY_NAME
Display name of the fleet to be created (optional). 4-30 characters, alphanumeric and [ '"!-] only.
--labels=[KEY=VALUE,…]
List of label KEY=VALUE pairs to add.

Keys must start with a lowercase character and contain only hyphens (-), underscores (_), lowercase characters, and numbers. Values must contain only hyphens (-), underscores (_), lowercase characters, and numbers.

Default cluster configurations to apply across the fleet.
Binary Authorization config.
--binauthz-evaluation-mode=BINAUTHZ_EVALUATION_MODE
Configure binary authorization mode for clusters to onboard the fleet,
gcloud container fleet create --binauthz-evaluation-mode=policy-bindings

BINAUTHZ_EVALUATION_MODE must be one of: disabled, policy-bindings.

--binauthz-policy-bindings=[name=BINAUTHZ_POLICY]
The relative resource name of the Binary Authorization policy to audit and/or enforce. GKE policies have the following format: projects/{project_number}/platforms/gke/policies/{policy_id}.
Security posture config.
--security-posture=SECURITY_POSTURE
To apply standard security posture to clusters in the fleet,
gcloud container fleet create --security-posture=standard

SECURITY_POSTURE must be one of: disabled, standard, enterprise.

--workload-vulnerability-scanning=WORKLOAD_VULNERABILITY_SCANNING
To apply standard vulnerability scanning to clusters in the fleet,
gcloud container fleet create --workload-vulnerability-scanning=standard

WORKLOAD_VULNERABILITY_SCANNING must be one of: disabled, standard, enterprise.

GCLOUD WIDE FLAGS
These flags are available to all commands: --access-token-file, --account, --billing-project, --configuration, --flags-file, --flatten, --format, --help, --impersonate-service-account, --log-http, --project, --quiet, --trace-token, --user-output-enabled, --verbosity.

Run $ gcloud help for details.

NOTES
These variants are also available:
gcloud alpha container fleet create
gcloud beta container fleet create