HEX
Server: Apache/2.4.65 (Ubuntu)
System: Linux ielts-store-v2 6.8.0-1036-gcp #38~22.04.1-Ubuntu SMP Thu Aug 14 01:19:18 UTC 2025 x86_64
User: root (0)
PHP: 7.2.34-54+ubuntu20.04.1+deb.sury.org+1
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
Upload Files
File: //snap/google-cloud-cli/394/help/man/man1/gcloud_alpha_compute_security-policies_create.1
.TH "GCLOUD_ALPHA_COMPUTE_SECURITY\-POLICIES_CREATE" 1



.SH "NAME"
.HP
gcloud alpha compute security\-policies create \- create a Compute Engine security policy



.SH "SYNOPSIS"
.HP
\f5gcloud alpha compute security\-policies create\fR \fINAME\fR [\fB\-\-description\fR=\fIDESCRIPTION\fR] [\fB\-\-file\-format\fR=\fIFILE_FORMAT\fR] [\fB\-\-file\-name\fR=\fIFILE_NAME\fR\ |\ \fB\-\-type\fR=\fISECURITY_POLICY_TYPE\fR] [\fB\-\-global\fR\ |\ \fB\-\-region\fR=\fIREGION\fR] [\fIGCLOUD_WIDE_FLAG\ ...\fR]



.SH "DESCRIPTION"

\fB(ALPHA)\fR \fBgcloud alpha compute security\-policies create\fR is used to
create security policies. A security policy policy is a set of rules that
controls access to various resources.



.SH "EXAMPLES"

To create a security policy with a given type and description, run:

.RS 2m
$ gcloud alpha compute security\-policies create my\-policy \e
    \-\-type=CLOUD_ARMOR_EDGE \-\-description="policy description"
.RE

To create a security from an input file, run:

.RS 2m
$ gcloud alpha compute security\-policies create my\-policy \e
    \-\-file\-name=my\-file\-name
.RE



.SH "POSITIONAL ARGUMENTS"

.RS 2m
.TP 2m
\fINAME\fR

Name of the security policy to create.


.RE
.sp

.SH "FLAGS"

.RS 2m
.TP 2m
\fB\-\-description\fR=\fIDESCRIPTION\fR

An optional, textual description for the security policy.

.TP 2m
\fB\-\-file\-format\fR=\fIFILE_FORMAT\fR

The format of the file to create the security policy config from. Specify either
yaml or json. Defaults to yaml if not specified. Will be ignored if
\-\-file\-name is not specified. \fIFILE_FORMAT\fR must be one of: \fBjson\fR,
\fByaml\fR.

.TP 2m

Creation options.

At most one of these can be specified:


.RS 2m
.TP 2m
\fB\-\-file\-name\fR=\fIFILE_NAME\fR

The name of the JSON or YAML file to create a security policy config from.

.TP 2m
\fB\-\-type\fR=\fISECURITY_POLICY_TYPE\fR

The type indicates the intended use of the security policy.
\fISECURITY_POLICY_TYPE\fR must be one of: \fBCLOUD_ARMOR\fR,
\fBCLOUD_ARMOR_EDGE\fR, \fBCLOUD_ARMOR_NETWORK\fR,
\fBCLOUD_ARMOR_INTERNAL_SERVICE\fR.

.RE
.sp
.TP 2m

At most one of these can be specified:


.RS 2m
.TP 2m
\fB\-\-global\fR

If set, the security policy is global.

.TP 2m
\fB\-\-region\fR=\fIREGION\fR

Region of the security policy to create. Overrides the default
\fBcompute/region\fR property value for this command invocation.


.RE
.RE
.sp

.SH "GCLOUD WIDE FLAGS"

These flags are available to all commands: \-\-access\-token\-file, \-\-account,
\-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten,
\-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http,
\-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled,
\-\-verbosity.

Run \fB$ gcloud help\fR for details.



.SH "NOTES"

This command is currently in alpha and might change without notice. If this
command fails with API permission errors despite specifying the correct project,
you might be trying to access an API with an invitation\-only early access
allowlist. These variants are also available:

.RS 2m
$ gcloud compute security\-policies create
.RE

.RS 2m
$ gcloud beta compute security\-policies create
.RE