File: //snap/google-cloud-cli/396/help/man/man1/gcloud_alpha_model-armor_floorsettings_update.1
.TH "GCLOUD_ALPHA_MODEL\-ARMOR_FLOORSETTINGS_UPDATE" 1
.SH "NAME"
.HP
gcloud alpha model\-armor floorsettings update \- update the FloorSetting resource
.SH "SYNOPSIS"
.HP
\f5gcloud alpha model\-armor floorsettings update\fR \fB\-\-full\-uri\fR=\fIFULL_URI\fR [\fB\-\-enable\-floor\-setting\-enforcement\fR=\fIENABLE_FLOOR_SETTING_ENFORCEMENT\fR] [\fB\-\-malicious\-uri\-filter\-settings\-enforcement\fR=\fIMALICIOUS_URI_FILTER_SETTINGS_ENFORCEMENT\fR] [\fB\-\-add\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR] | \fB\-\-clear\-rai\-settings\-filters\fR | \fB\-\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR]\ |\ \fB\-\-remove\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR]]\ [\fB\-\-advanced\-config\-deidentify\-template\fR=\fIADVANCED_CONFIG_DEIDENTIFY_TEMPLATE\fR\ \fB\-\-advanced\-config\-inspect\-template\fR=\fIADVANCED_CONFIG_INSPECT_TEMPLATE\fR\ \fB\-\-basic\-config\-filter\-enforcement\fR=\fIBASIC_CONFIG_FILTER_ENFORCEMENT\fR]\ [\fB\-\-pi\-and\-jailbreak\-filter\-settings\-confidence\-level\fR=\fIPI_AND_JAILBREAK_FILTER_SETTINGS_CONFIDENCE_LEVEL\fR\ \fB\-\-pi\-and\-jailbreak\-filter\-settings\-enforcement\fR=\fIPI_AND_JAILBREAK_FILTER_SETTINGS_ENFORCEMENT\fR]\ [\fIGCLOUD_WIDE_FLAG\ ...\fR]
.SH "DESCRIPTION"
\fB(ALPHA)\fR Updates the floor setting resource with the given name.
.SH "REQUIRED FLAGS"
.RS 2m
.TP 2m
\fB\-\-full\-uri\fR=\fIFULL_URI\fR
Full uri of the floor setting
.RE
.sp
.SH "OPTIONAL FLAGS"
.RS 2m
.TP 2m
\fB\-\-enable\-floor\-setting\-enforcement\fR=\fIENABLE_FLOOR_SETTING_ENFORCEMENT\fR
Enable or disable the floor setting enforcement
.TP 2m
Malicious uri filter settings.
.RS 2m
.TP 2m
\fB\-\-malicious\-uri\-filter\-settings\-enforcement\fR=\fIMALICIOUS_URI_FILTER_SETTINGS_ENFORCEMENT\fR
Malicious URI filter settings.
.RE
.sp
.TP 2m
RAI filter settings.
At most one of these can be specified:
.RS 2m
.TP 2m
\fB\-\-add\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR]
Add rai filter settings. Sets \f5add_rai_settings_filters\fR value.
\fBShorthand Example:\fR
.RS 2m
\-\-add\-rai\-settings\-filters=string,string
.RE
\fBJSON Example:\fR
.RS 2m
\-\-add\-rai\-settings\-filters=["string"]
.RE
\fBFile Example:\fR
.RS 2m
\-\-add\-rai\-settings\-filters=path_to_file.(yaml|json)
.RE
.TP 2m
\fB\-\-clear\-rai\-settings\-filters\fR
Clear all rai filter settings.
.TP 2m
\fB\-\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR]
Set rai_settings_filters to new value. List of Responsible AI filters enabled
for floor setting. Sets \f5rai_settings_filters\fR value.
\fBShorthand Example:\fR
.RS 2m
\-\-rai\-settings\-filters=string,string
.RE
\fBJSON Example:\fR
.RS 2m
\-\-rai\-settings\-filters=["string"]
.RE
\fBFile Example:\fR
.RS 2m
\-\-rai\-settings\-filters=path_to_file.(yaml|json)
.RE
.TP 2m
\fB\-\-remove\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR]
Remove rai filter settings. Sets \f5remove_rai_settings_filters\fR value.
\fBShorthand Example:\fR
.RS 2m
\-\-remove\-rai\-settings\-filters=string,string
.RE
\fBJSON Example:\fR
.RS 2m
\-\-remove\-rai\-settings\-filters=["string"]
.RE
\fBFile Example:\fR
.RS 2m
\-\-remove\-rai\-settings\-filters=path_to_file.(yaml|json)
.RE
.RE
.sp
.TP 2m
SDP filter settings.
.RS 2m
.TP 2m
\fB\-\-advanced\-config\-deidentify\-template\fR=\fIADVANCED_CONFIG_DEIDENTIFY_TEMPLATE\fR
The sdp filter settings enforcement. The value can be either "enable" or
"disable".
.TP 2m
\fB\-\-advanced\-config\-inspect\-template\fR=\fIADVANCED_CONFIG_INSPECT_TEMPLATE\fR
The sdp filter settings enforcement. The value can be either "enable" or
"disable".
.TP 2m
\fB\-\-basic\-config\-filter\-enforcement\fR=\fIBASIC_CONFIG_FILTER_ENFORCEMENT\fR
The sdp filter settings enforcement. The value can be either "ENABLED" or
"DISABLED"
.RE
.sp
.TP 2m
PI and jailbreak filter settings.
.RS 2m
.TP 2m
\fB\-\-pi\-and\-jailbreak\-filter\-settings\-confidence\-level\fR=\fIPI_AND_JAILBREAK_FILTER_SETTINGS_CONFIDENCE_LEVEL\fR
The pi and jailbreak filter settings confidence level. The value can be either
"high", "medium\-and\-above" or "low\-and\-above"
.TP 2m
\fB\-\-pi\-and\-jailbreak\-filter\-settings\-enforcement\fR=\fIPI_AND_JAILBREAK_FILTER_SETTINGS_ENFORCEMENT\fR
The pi and jailbreak filter settings enforcement. The value can be either
"enable" or "disable".
.RE
.RE
.sp
.SH "GCLOUD WIDE FLAGS"
These flags are available to all commands: \-\-access\-token\-file, \-\-account,
\-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten,
\-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http,
\-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled,
\-\-verbosity.
Run \fB$ gcloud help\fR for details.
.SH "NOTES"
This command is currently in alpha and might change without notice. If this
command fails with API permission errors despite specifying the correct project,
you might be trying to access an API with an invitation\-only early access
allowlist. These variants are also available:
.RS 2m
$ gcloud model\-armor floorsettings update
.RE
.RS 2m
$ gcloud beta model\-armor floorsettings update
.RE