HEX
Server: Apache/2.4.65 (Ubuntu)
System: Linux ielts-store-v2 6.8.0-1036-gcp #38~22.04.1-Ubuntu SMP Thu Aug 14 01:19:18 UTC 2025 x86_64
User: root (0)
PHP: 7.2.34-54+ubuntu20.04.1+deb.sury.org+1
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
Upload Files
File: //snap/google-cloud-cli/396/help/man/man1/gcloud_alpha_kms_import-jobs_create.1
.TH "GCLOUD_ALPHA_KMS_IMPORT\-JOBS_CREATE" 1



.SH "NAME"
.HP
gcloud alpha kms import\-jobs create \- create a new import job



.SH "SYNOPSIS"
.HP
\f5gcloud alpha kms import\-jobs create\fR \fIIMPORT_JOB\fR \fB\-\-import\-method\fR=\fIIMPORT_METHOD\fR \fB\-\-protection\-level\fR=\fIPROTECTION_LEVEL\fR [\fB\-\-keyring\fR=\fIKEYRING\fR] [\fB\-\-location\fR=\fILOCATION\fR] [\fIGCLOUD_WIDE_FLAG\ ...\fR]



.SH "DESCRIPTION"

\fB(ALPHA)\fR Creates a new import job within the given keyring.



.SH "EXAMPLES"

The following command creates a new import job named 'strider' within the
\'fellowship' keyring, and 'us\-central1' location:

.RS 2m
$ gcloud alpha kms import\-jobs create strider \e
    \-\-location=us\-central1 \-\-keyring=fellowship \e
    \-\-import\-method=rsa\-oaep\-3072\-sha256\-aes\-256 \e
    \-\-protection\-level=hsm
.RE



.SH "POSITIONAL ARGUMENTS"

.RS 2m
.TP 2m
\fIIMPORT_JOB\fR

Name of the import job to create.


.RE
.sp

.SH "REQUIRED FLAGS"

.RS 2m
.TP 2m
\fB\-\-import\-method\fR=\fIIMPORT_METHOD\fR

The wrapping method to be used for incoming key material. For more information
about choosing an import method, see
https://cloud.google.com/kms/docs/key\-wrapping. \fIIMPORT_METHOD\fR must be one
of: \fBrsa\-oaep\-3072\-sha1\-aes\-256\fR, \fBrsa\-oaep\-3072\-sha256\fR,
\fBrsa\-oaep\-3072\-sha256\-aes\-256\fR, \fBrsa\-oaep\-4096\-sha1\-aes\-256\fR,
\fBrsa\-oaep\-4096\-sha256\fR, \fBrsa\-oaep\-4096\-sha256\-aes\-256\fR.

.TP 2m
\fB\-\-protection\-level\fR=\fIPROTECTION_LEVEL\fR

Protection level of the import job. \fIPROTECTION_LEVEL\fR must be one of:
\fBsoftware\fR, \fBhsm\fR.


.RE
.sp

.SH "OPTIONAL FLAGS"

.RS 2m
.TP 2m
\fB\-\-keyring\fR=\fIKEYRING\fR

Key ring of the import job.

.TP 2m
\fB\-\-location\fR=\fILOCATION\fR

Location of the import job.


.RE
.sp

.SH "GCLOUD WIDE FLAGS"

These flags are available to all commands: \-\-access\-token\-file, \-\-account,
\-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten,
\-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http,
\-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled,
\-\-verbosity.

Run \fB$ gcloud help\fR for details.



.SH "NOTES"

This command is currently in alpha and might change without notice. If this
command fails with API permission errors despite specifying the correct project,
you might be trying to access an API with an invitation\-only early access
allowlist. These variants are also available:

.RS 2m
$ gcloud kms import\-jobs create
.RE

.RS 2m
$ gcloud beta kms import\-jobs create
.RE