File: //snap/google-cloud-cli/394/help/man/man1/gcloud_beta_model-armor_floorsettings_update.1
.TH "GCLOUD_BETA_MODEL\-ARMOR_FLOORSETTINGS_UPDATE" 1
.SH "NAME"
.HP
gcloud beta model\-armor floorsettings update \- update the FloorSetting resource
.SH "SYNOPSIS"
.HP
\f5gcloud beta model\-armor floorsettings update\fR \fB\-\-full\-uri\fR=\fIFULL_URI\fR [\fB\-\-enable\-floor\-setting\-enforcement\fR=\fIENABLE_FLOOR_SETTING_ENFORCEMENT\fR] [\fB\-\-malicious\-uri\-filter\-settings\-enforcement\fR=\fIMALICIOUS_URI_FILTER_SETTINGS_ENFORCEMENT\fR] [\fB\-\-add\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR] | \fB\-\-clear\-rai\-settings\-filters\fR | \fB\-\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR]\ |\ \fB\-\-remove\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR]]\ [\fB\-\-advanced\-config\-deidentify\-template\fR=\fIADVANCED_CONFIG_DEIDENTIFY_TEMPLATE\fR\ \fB\-\-advanced\-config\-inspect\-template\fR=\fIADVANCED_CONFIG_INSPECT_TEMPLATE\fR\ \fB\-\-basic\-config\-filter\-enforcement\fR=\fIBASIC_CONFIG_FILTER_ENFORCEMENT\fR]\ [\fB\-\-pi\-and\-jailbreak\-filter\-settings\-confidence\-level\fR=\fIPI_AND_JAILBREAK_FILTER_SETTINGS_CONFIDENCE_LEVEL\fR\ \fB\-\-pi\-and\-jailbreak\-filter\-settings\-enforcement\fR=\fIPI_AND_JAILBREAK_FILTER_SETTINGS_ENFORCEMENT\fR]\ [\fIGCLOUD_WIDE_FLAG\ ...\fR]
.SH "DESCRIPTION"
\fB(BETA)\fR Updates the floor setting resource with the given name.
.SH "REQUIRED FLAGS"
.RS 2m
.TP 2m
\fB\-\-full\-uri\fR=\fIFULL_URI\fR
Full uri of the floor setting
.RE
.sp
.SH "OPTIONAL FLAGS"
.RS 2m
.TP 2m
\fB\-\-enable\-floor\-setting\-enforcement\fR=\fIENABLE_FLOOR_SETTING_ENFORCEMENT\fR
Enable or disable the floor setting enforcement
.TP 2m
Malicious uri filter settings.
.RS 2m
.TP 2m
\fB\-\-malicious\-uri\-filter\-settings\-enforcement\fR=\fIMALICIOUS_URI_FILTER_SETTINGS_ENFORCEMENT\fR
Malicious URI filter settings.
.RE
.sp
.TP 2m
RAI filter settings.
At most one of these can be specified:
.RS 2m
.TP 2m
\fB\-\-add\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR]
Add rai filter settings. Sets \f5add_rai_settings_filters\fR value.
\fBShorthand Example:\fR
.RS 2m
\-\-add\-rai\-settings\-filters=string,string
.RE
\fBJSON Example:\fR
.RS 2m
\-\-add\-rai\-settings\-filters=["string"]
.RE
\fBFile Example:\fR
.RS 2m
\-\-add\-rai\-settings\-filters=path_to_file.(yaml|json)
.RE
.TP 2m
\fB\-\-clear\-rai\-settings\-filters\fR
Clear all rai filter settings.
.TP 2m
\fB\-\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR]
Set rai_settings_filters to new value. List of Responsible AI filters enabled
for floor setting. Sets \f5rai_settings_filters\fR value.
\fBShorthand Example:\fR
.RS 2m
\-\-rai\-settings\-filters=string,string
.RE
\fBJSON Example:\fR
.RS 2m
\-\-rai\-settings\-filters=["string"]
.RE
\fBFile Example:\fR
.RS 2m
\-\-rai\-settings\-filters=path_to_file.(yaml|json)
.RE
.TP 2m
\fB\-\-remove\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR]
Remove rai filter settings. Sets \f5remove_rai_settings_filters\fR value.
\fBShorthand Example:\fR
.RS 2m
\-\-remove\-rai\-settings\-filters=string,string
.RE
\fBJSON Example:\fR
.RS 2m
\-\-remove\-rai\-settings\-filters=["string"]
.RE
\fBFile Example:\fR
.RS 2m
\-\-remove\-rai\-settings\-filters=path_to_file.(yaml|json)
.RE
.RE
.sp
.TP 2m
SDP filter settings.
.RS 2m
.TP 2m
\fB\-\-advanced\-config\-deidentify\-template\fR=\fIADVANCED_CONFIG_DEIDENTIFY_TEMPLATE\fR
The sdp filter settings enforcement. The value can be either "enable" or
"disable".
.TP 2m
\fB\-\-advanced\-config\-inspect\-template\fR=\fIADVANCED_CONFIG_INSPECT_TEMPLATE\fR
The sdp filter settings enforcement. The value can be either "enable" or
"disable".
.TP 2m
\fB\-\-basic\-config\-filter\-enforcement\fR=\fIBASIC_CONFIG_FILTER_ENFORCEMENT\fR
The sdp filter settings enforcement. The value can be either "ENABLED" or
"DISABLED"
.RE
.sp
.TP 2m
PI and jailbreak filter settings.
.RS 2m
.TP 2m
\fB\-\-pi\-and\-jailbreak\-filter\-settings\-confidence\-level\fR=\fIPI_AND_JAILBREAK_FILTER_SETTINGS_CONFIDENCE_LEVEL\fR
The pi and jailbreak filter settings confidence level. The value can be either
"high", "medium\-and\-above" or "low\-and\-above"
.TP 2m
\fB\-\-pi\-and\-jailbreak\-filter\-settings\-enforcement\fR=\fIPI_AND_JAILBREAK_FILTER_SETTINGS_ENFORCEMENT\fR
The pi and jailbreak filter settings enforcement. The value can be either
"enable" or "disable".
.RE
.RE
.sp
.SH "GCLOUD WIDE FLAGS"
These flags are available to all commands: \-\-access\-token\-file, \-\-account,
\-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten,
\-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http,
\-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled,
\-\-verbosity.
Run \fB$ gcloud help\fR for details.
.SH "NOTES"
This command is currently in beta and might change without notice. These
variants are also available:
.RS 2m
$ gcloud model\-armor floorsettings update
.RE
.RS 2m
$ gcloud alpha model\-armor floorsettings update
.RE