You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<pclass="firstline">Creates a snapshot of a specified persistent disk.</p>
91
+
<pclass="firstline">Creates a snapshot of a specified persistent disk. For regular snapshot creation, consider using snapshots.insert instead, as that method supports more features, such as creating snapshots in a project different from the source disk project.</p>
<pclass="firstline">Deletes the specified persistent disk. Deleting a disk removes its data permanently and is irreversible. However, deleting a disk does not delete any snapshots previously made from the disk. You must separately delete snapshots.</p>
@@ -124,7 +124,7 @@ <h2>Instance Methods</h2>
124
124
<pclass="firstline">Returns permissions that a caller has on the specified resource.</p>
<pclass="firstline">Update the specified disk with the data included in the request. Update is performed only on selected fields included as part of update-mask. Only the following fields can be modified: user_license.</p>
127
+
<pclass="firstline">Updates the specified disk with the data included in the request. The update is performed only on selected fields included as part of update-mask. Only the following fields can be modified: user_license.</p>
<pre>Creates a snapshot of a specified persistent disk.
368
+
<pre>Creates a snapshot of a specified persistent disk. For regular snapshot creation, consider using snapshots.insert instead, as that method supports more features, such as creating snapshots in a project different from the source disk project.
369
369
370
370
Args:
371
371
project: string, Project ID for this request. (required)
@@ -412,6 +412,7 @@ <h3>Method Details</h3>
412
412
"rsaEncryptedKey": "A String", # Specifies an RFC 4648 base64 encoded, RSA-wrapped 2048-bit customer-supplied encryption key to either encrypt or decrypt this resource. You can provide either the rawKey or the rsaEncryptedKey. For example: "rsaEncryptedKey": "ieCx/NcW06PcT7Ep1X6LUTc/hLvUDYyzSZPPVCVPTVEohpeHASqC8uw5TzyO9U+Fka9JFH z0mBibXUInrC/jEk014kCK/NPjYgEMOyssZ4ZINPKxlUh2zn1bV+MCaTICrdmuSBTWlUUiFoD D6PYznLwh8ZNdaheCeZ8ewEXgFQ8V+sDroLaN3Xs3MDTXQEMMoNUXMCZEIpg9Vtp9x2oe==" The key must meet the following requirements before you can provide it to Compute Engine: 1. The key is wrapped using a RSA public key certificate provided by Google. 2. After being wrapped, the key must be encoded in RFC 4648 base64 encoding. Gets the RSA public key certificate provided by Google at: https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
413
413
"sha256": "A String", # [Output only] The RFC 4648 base64 encoded SHA-256 hash of the customer-supplied encryption key that protects this resource.
414
414
},
415
+
"snapshotType": "A String", # Indicates the type of the snapshot.
415
416
"sourceDisk": "A String", # The source disk used to create this snapshot.
416
417
"sourceDiskEncryptionKey": { # The customer-supplied encryption key of the source disk. Required if the source disk is protected by a customer-supplied encryption key.
417
418
"kmsKeyName": "A String", # The name of the encryption key that is stored in Google Cloud KMS. For example: "kmsKeyName": "projects/kms_project_id/locations/region/keyRings/ key_region/cryptoKeys/key
<pre>Update the specified disk with the data included in the request. Update is performed only on selected fields included as part of update-mask. Only the following fields can be modified: user_license.
1541
+
<pre>Updates the specified disk with the data included in the request. The update is performed only on selected fields included as part of update-mask. Only the following fields can be modified: user_license.
1541
1542
1542
1543
Args:
1543
1544
project: string, Project ID for this request. (required)
Copy file name to clipboardexpand all lines: docs/dyn/compute_alpha.firewallPolicies.html
+42
Original file line number
Diff line number
Diff line change
@@ -239,6 +239,9 @@ <h3>Method Details</h3>
239
239
"destIpRanges": [ # CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.
240
240
"A String",
241
241
],
242
+
"destRegionCodes": [ # Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of dest region codes allowed is 5000.
243
+
"A String",
244
+
],
242
245
"layer4Configs": [ # Pairs of IP protocols and ports that the rule should match.
243
246
{
244
247
"ipProtocol": "A String", # The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
@@ -256,6 +259,9 @@ <h3>Method Details</h3>
256
259
"srcIpRanges": [ # CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.
257
260
"A String",
258
261
],
262
+
"srcRegionCodes": [ # Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of source region codes allowed is 5000.
263
+
"A String",
264
+
],
259
265
"srcSecureTags": [ # List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag are INEFFECTIVE, and there is no srcIpRange, this rule will be ignored. Maximum number of source tag values allowed is 256.
260
266
{
261
267
"name": "A String", # Name of the secure tag, created with TagManager's TagValue API.
@@ -529,6 +535,9 @@ <h3>Method Details</h3>
529
535
"destIpRanges": [ # CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.
530
536
"A String",
531
537
],
538
+
"destRegionCodes": [ # Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of dest region codes allowed is 5000.
539
+
"A String",
540
+
],
532
541
"layer4Configs": [ # Pairs of IP protocols and ports that the rule should match.
533
542
{
534
543
"ipProtocol": "A String", # The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
@@ -546,6 +555,9 @@ <h3>Method Details</h3>
546
555
"srcIpRanges": [ # CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.
547
556
"A String",
548
557
],
558
+
"srcRegionCodes": [ # Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of source region codes allowed is 5000.
559
+
"A String",
560
+
],
549
561
"srcSecureTags": [ # List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag are INEFFECTIVE, and there is no srcIpRange, this rule will be ignored. Maximum number of source tag values allowed is 256.
550
562
{
551
563
"name": "A String", # Name of the secure tag, created with TagManager's TagValue API.
@@ -733,6 +745,9 @@ <h3>Method Details</h3>
733
745
"destIpRanges": [ # CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.
734
746
"A String",
735
747
],
748
+
"destRegionCodes": [ # Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of dest region codes allowed is 5000.
749
+
"A String",
750
+
],
736
751
"layer4Configs": [ # Pairs of IP protocols and ports that the rule should match.
737
752
{
738
753
"ipProtocol": "A String", # The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
@@ -750,6 +765,9 @@ <h3>Method Details</h3>
750
765
"srcIpRanges": [ # CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.
751
766
"A String",
752
767
],
768
+
"srcRegionCodes": [ # Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of source region codes allowed is 5000.
769
+
"A String",
770
+
],
753
771
"srcSecureTags": [ # List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag are INEFFECTIVE, and there is no srcIpRange, this rule will be ignored. Maximum number of source tag values allowed is 256.
754
772
{
755
773
"name": "A String", # Name of the secure tag, created with TagManager's TagValue API.
@@ -820,6 +838,9 @@ <h3>Method Details</h3>
820
838
"destIpRanges": [ # CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.
821
839
"A String",
822
840
],
841
+
"destRegionCodes": [ # Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of dest region codes allowed is 5000.
842
+
"A String",
843
+
],
823
844
"layer4Configs": [ # Pairs of IP protocols and ports that the rule should match.
824
845
{
825
846
"ipProtocol": "A String", # The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
@@ -837,6 +858,9 @@ <h3>Method Details</h3>
837
858
"srcIpRanges": [ # CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.
838
859
"A String",
839
860
],
861
+
"srcRegionCodes": [ # Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of source region codes allowed is 5000.
862
+
"A String",
863
+
],
840
864
"srcSecureTags": [ # List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag are INEFFECTIVE, and there is no srcIpRange, this rule will be ignored. Maximum number of source tag values allowed is 256.
841
865
{
842
866
"name": "A String", # Name of the secure tag, created with TagManager's TagValue API.
@@ -986,6 +1010,9 @@ <h3>Method Details</h3>
986
1010
"destIpRanges": [ # CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.
987
1011
"A String",
988
1012
],
1013
+
"destRegionCodes": [ # Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of dest region codes allowed is 5000.
1014
+
"A String",
1015
+
],
989
1016
"layer4Configs": [ # Pairs of IP protocols and ports that the rule should match.
990
1017
{
991
1018
"ipProtocol": "A String", # The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
@@ -1003,6 +1030,9 @@ <h3>Method Details</h3>
1003
1030
"srcIpRanges": [ # CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.
1004
1031
"A String",
1005
1032
],
1033
+
"srcRegionCodes": [ # Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of source region codes allowed is 5000.
1034
+
"A String",
1035
+
],
1006
1036
"srcSecureTags": [ # List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag are INEFFECTIVE, and there is no srcIpRange, this rule will be ignored. Maximum number of source tag values allowed is 256.
1007
1037
{
1008
1038
"name": "A String", # Name of the secure tag, created with TagManager's TagValue API.
@@ -1202,6 +1232,9 @@ <h3>Method Details</h3>
1202
1232
"destIpRanges": [ # CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.
1203
1233
"A String",
1204
1234
],
1235
+
"destRegionCodes": [ # Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of dest region codes allowed is 5000.
1236
+
"A String",
1237
+
],
1205
1238
"layer4Configs": [ # Pairs of IP protocols and ports that the rule should match.
1206
1239
{
1207
1240
"ipProtocol": "A String", # The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
@@ -1219,6 +1252,9 @@ <h3>Method Details</h3>
1219
1252
"srcIpRanges": [ # CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.
1220
1253
"A String",
1221
1254
],
1255
+
"srcRegionCodes": [ # Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of source region codes allowed is 5000.
1256
+
"A String",
1257
+
],
1222
1258
"srcSecureTags": [ # List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag are INEFFECTIVE, and there is no srcIpRange, this rule will be ignored. Maximum number of source tag values allowed is 256.
1223
1259
{
1224
1260
"name": "A String", # Name of the secure tag, created with TagManager's TagValue API.
@@ -1333,6 +1369,9 @@ <h3>Method Details</h3>
1333
1369
"destIpRanges": [ # CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.
1334
1370
"A String",
1335
1371
],
1372
+
"destRegionCodes": [ # Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of dest region codes allowed is 5000.
1373
+
"A String",
1374
+
],
1336
1375
"layer4Configs": [ # Pairs of IP protocols and ports that the rule should match.
1337
1376
{
1338
1377
"ipProtocol": "A String", # The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
@@ -1350,6 +1389,9 @@ <h3>Method Details</h3>
1350
1389
"srcIpRanges": [ # CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.
1351
1390
"A String",
1352
1391
],
1392
+
"srcRegionCodes": [ # Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of source region codes allowed is 5000.
1393
+
"A String",
1394
+
],
1353
1395
"srcSecureTags": [ # List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag are INEFFECTIVE, and there is no srcIpRange, this rule will be ignored. Maximum number of source tag values allowed is 256.
1354
1396
{
1355
1397
"name": "A String", # Name of the secure tag, created with TagManager's TagValue API.
0 commit comments