HEX
Server: Apache/2.4.65 (Ubuntu)
System: Linux ielts-store-v2 6.8.0-1036-gcp #38~22.04.1-Ubuntu SMP Thu Aug 14 01:19:18 UTC 2025 x86_64
User: root (0)
PHP: 7.2.34-54+ubuntu20.04.1+deb.sury.org+1
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
Upload Files
File: //snap/google-cloud-cli/396/help/man/man1/gcloud_scc_custom-modules_sha_get.1
.TH "GCLOUD_SCC_CUSTOM\-MODULES_SHA_GET" 1



.SH "NAME"
.HP
gcloud scc custom\-modules sha get \- get the details of a Security Health Analytics custom module



.SH "SYNOPSIS"
.HP
\f5gcloud scc custom\-modules sha get\fR \fICUSTOM_MODULE\fR [\fB\-\-folder\fR=\fIFOLDER\fR\ |\ \fB\-\-organization\fR=\fIORGANIZATION\fR\ |\ \fB\-\-project\fR=\fIPROJECT\fR] [\fIGCLOUD_WIDE_FLAG\ ...\fR]



.SH "DESCRIPTION"

Get the details of a Security Health Analytics custom module. It does not
resolve INHERITED enablement states to ENABLED or DISABLED for modules created
at ancestor levels. For example, if the module is enabled at the ancestor level,
modules for all child resources will have the enablement state set to INHERITED.
Use \f5gcloud scc custom\-modules sha get\-effective\fR to retrieve a custom
module with its effective enablement state.



.SH "EXAMPLES"

To get the details of a Security Health Analytics custom module with ID
\f5123456\fR for organization \f5123\fR, run:

.RS 2m
$ gcloud scc custom\-modules sha get 123456 \e
    \-\-organization=organizations/123
.RE

To get the details of a Security Health Analytics custom module with ID
\f5123456\fR for folder \f5456\fR, run:

.RS 2m
$ gcloud scc custom\-modules sha get 123456 \-\-folder=folders/456
.RE

To get the details of a Security Health Analytics custom module with ID
\f5123456\fR for project \f5789\fR, run:

.RS 2m
$ gcloud scc custom\-modules sha get 123456 \-\-project=projects/789
.RE



.SH "POSITIONAL ARGUMENTS"

.RS 2m
.TP 2m
\fICUSTOM_MODULE\fR

ID or the full resource name of the Security Health Analytics custom module. If
you specify the full resource name, you do not need to specify the
\-\-organization, \-\-folder, or \-\-project flags.


.RE
.sp

.SH "FLAGS"

.RS 2m
.TP 2m

At most one of these can be specified:


.RS 2m
.TP 2m
\fB\-\-folder\fR=\fIFOLDER\fR

Folder from which to get the custom module details. Formatted as
\f5folders/456\fR or just \f5456\fR.

.TP 2m
\fB\-\-organization\fR=\fIORGANIZATION\fR

Organization from which to get the custom module details. Formatted as
\f5organizations/123\fR or just \f5123\fR.

.TP 2m
\fB\-\-project\fR=\fIPROJECT\fR

ID or number of the project from which to get the custom module details.
Formatted as \f5projects/789\fR or just \f5789\fR.


.RE
.RE
.sp

.SH "GCLOUD WIDE FLAGS"

These flags are available to all commands: \-\-access\-token\-file, \-\-account,
\-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten,
\-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http,
\-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled,
\-\-verbosity.

Run \fB$ gcloud help\fR for details.



.SH "API REFERENCE"

This command uses the \fBsecuritycenter/v1\fR API. The full documentation for
this API can be found at: https://cloud.google.com/security\-command\-center



.SH "NOTES"

This variant is also available:

.RS 2m
$ gcloud alpha scc custom\-modules sha get
.RE