- NAME
-
- gcloud container fleet create - create a fleet
- SYNOPSIS
-
-
gcloud container fleet create
[--async
] [--display-name
=DISPLAY_NAME
] [--labels
=[KEY
=VALUE
,…]] [--binauthz-evaluation-mode
=BINAUTHZ_EVALUATION_MODE
--binauthz-policy-bindings
=[name
=BINAUTHZ_POLICY
]--security-posture
=SECURITY_POSTURE
--workload-vulnerability-scanning
=WORKLOAD_VULNERABILITY_SCANNING
] [GCLOUD_WIDE_FLAG …
]
-
- DESCRIPTION
-
This command can fail for the following reasons:
- The project specified does not exist.
- The project specified already has a fleet.
- The active account does not have permission to access the given project.
- EXAMPLES
-
To create a fleet in project
example-foo-bar-1
with display namemy-fleet
, run:gcloud container fleet create --display-name=my-fleet --project=example-foo-bar-1
- FLAGS
-
--async
- Return immediately, without waiting for the operation in progress to complete.
--display-name
=DISPLAY_NAME
- Display name of the fleet to be created (optional). 4-30 characters, alphanumeric and [ '"!-] only.
--labels
=[KEY
=VALUE
,…]-
List of label KEY=VALUE pairs to add.
Keys must start with a lowercase character and contain only hyphens (
-
), underscores (_
), lowercase characters, and numbers. Values must contain only hyphens (-
), underscores (_
), lowercase characters, and numbers. -
Default cluster configurations to apply across the fleet.
-
Binary Authorization config.
--binauthz-evaluation-mode
=BINAUTHZ_EVALUATION_MODE
-
Configure binary authorization mode for clusters to onboard the fleet,
gcloud container fleet create --binauthz-evaluation-mode=policy-bindings
BINAUTHZ_EVALUATION_MODE
must be one of:disabled
,policy-bindings
. --binauthz-policy-bindings
=[name
=BINAUTHZ_POLICY
]-
The relative resource name of the Binary Authorization policy to audit and/or
enforce. GKE policies have the following format:
projects/{project_number}/platforms/gke/policies/{policy_id}
.
-
Security posture config.
--security-posture
=SECURITY_POSTURE
-
To apply standard security posture to clusters in the fleet,
gcloud container fleet create --security-posture=standard
SECURITY_POSTURE
must be one of:disabled
,standard
,enterprise
. --workload-vulnerability-scanning
=WORKLOAD_VULNERABILITY_SCANNING
-
To apply standard vulnerability scanning to clusters in the fleet,
gcloud container fleet create --workload-vulnerability-scanning=standard
WORKLOAD_VULNERABILITY_SCANNING
must be one of:disabled
,standard
,enterprise
.
-
Binary Authorization config.
- GCLOUD WIDE FLAGS
-
These flags are available to all commands:
--access-token-file
,--account
,--billing-project
,--configuration
,--flags-file
,--flatten
,--format
,--help
,--impersonate-service-account
,--log-http
,--project
,--quiet
,--trace-token
,--user-output-enabled
,--verbosity
.Run
$ gcloud help
for details. - NOTES
-
These variants are also available:
gcloud alpha container fleet create
gcloud beta container fleet create
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2024-05-21 UTC.