HEX
Server: Apache/2.4.65 (Ubuntu)
System: Linux ielts-store-v2 6.8.0-1036-gcp #38~22.04.1-Ubuntu SMP Thu Aug 14 01:19:18 UTC 2025 x86_64
User: root (0)
PHP: 7.2.34-54+ubuntu20.04.1+deb.sury.org+1
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
Upload Files
File: //snap/google-cloud-cli/current/help/man/man1/gcloud_alpha_workstations_configs_create.1
.TH "GCLOUD_ALPHA_WORKSTATIONS_CONFIGS_CREATE" 1



.SH "NAME"
.HP
gcloud alpha workstations configs create \- create a workstation configuration



.SH "SYNOPSIS"
.HP
\f5gcloud alpha workstations configs create\fR (\fICONFIG\fR\ :\ \fB\-\-cluster\fR=\fICLUSTER\fR\ \fB\-\-region\fR=\fIREGION\fR) [\fB\-\-allow\-unauthenticated\-cors\-preflight\-requests\fR] [\fB\-\-allowed\-ports\fR=[\fIALLOWED_PORTS\fR,...]] [\fB\-\-async\fR] [\fB\-\-boost\-config\fR=[\fIBOOST_CONFIG\fR,...]] [\fB\-\-boot\-disk\-size\fR=\fIBOOT_DISK_SIZE\fR;\ default=50] [\fB\-\-container\-args\fR=[\fICONTAINER_ARGS\fR,...]] [\fB\-\-container\-command\fR=[\fICONTAINER_COMMAND\fR,...]] [\fB\-\-container\-env\fR=[\fICONTAINER_ENV\fR,...]] [\fB\-\-container\-run\-as\-user\fR=\fICONTAINER_RUN_AS_USER\fR] [\fB\-\-container\-working\-dir\fR=\fICONTAINER_WORKING_DIR\fR] [\fB\-\-disable\-localhost\-replacement\fR] [\fB\-\-disable\-public\-ip\-addresses\fR] [\fB\-\-disable\-ssh\-to\-vm\fR] [\fB\-\-disable\-tcp\-connections\fR] [\fB\-\-enable\-audit\-agent\fR] [\fB\-\-enable\-confidential\-compute\fR] [\fB\-\-enable\-nested\-virtualization\fR] [\fB\-\-enable\-ssh\-to\-vm\fR] [\fB\-\-ephemeral\-directory\fR=[\fIPROPERTY\fR=\fIVALUE\fR,...]] [\fB\-\-grant\-workstation\-admin\-role\-on\-create\fR] [\fB\-\-idle\-timeout\fR=\fIIDLE_TIMEOUT\fR;\ default=7200] [\fB\-\-labels\fR=[\fILABELS\fR,...]] [\fB\-\-machine\-type\fR=\fIMACHINE_TYPE\fR;\ default="e2\-standard\-4"] [\fB\-\-max\-usable\-workstations\-count\fR=\fIMAX_USABLE_WORKSTATIONS_COUNT\fR] [\fB\-\-network\-tags\fR=[\fINETWORK_TAGS\fR,...]] [\fB\-\-pool\-size\fR=\fIPOOL_SIZE\fR] [\fB\-\-replica\-zones\fR=[\fIREPLICA_ZONES\fR,...]] [\fB\-\-reservation\-affinity\fR=[\fIRESERVATION_AFFINITY\fR,...]] [\fB\-\-running\-timeout\fR=\fIRUNNING_TIMEOUT\fR;\ default=7200] [\fB\-\-service\-account\fR=\fISERVICE_ACCOUNT\fR] [\fB\-\-service\-account\-scopes\fR=[\fISERVICE_ACCOUNT_SCOPES\fR,...]] [\fB\-\-shielded\-integrity\-monitoring\fR] [\fB\-\-shielded\-secure\-boot\fR] [\fB\-\-shielded\-vtpm\fR] [\fB\-\-vm\-tags\fR=[\fIVM_TAGS\fR,...]] [\fB\-\-accelerator\-count\fR=\fIACCELERATOR_COUNT\fR\ :\ \fB\-\-accelerator\-type\fR=\fIACCELERATOR_TYPE\fR] [\fB\-\-container\-custom\-image\fR=\fICONTAINER_CUSTOM_IMAGE\fR\ |\ \fB\-\-container\-predefined\-image\fR=\fICONTAINER_PREDEFINED_IMAGE\fR;\ default="codeoss"] [\fB\-\-kms\-key\fR=\fIKMS_KEY\fR\ :\ \fB\-\-kms\-key\-service\-account\fR=\fIKMS_KEY_SERVICE_ACCOUNT\fR] [\fB\-\-no\-persistent\-storage\fR\ |\ \fB\-\-pd\-disk\-type\fR=\fIPD_DISK_TYPE\fR;\ default="pd\-standard"\ \fB\-\-pd\-reclaim\-policy\fR=\fIPD_RECLAIM_POLICY\fR;\ default="delete"\ \fB\-\-pd\-disk\-size\fR=\fIPD_DISK_SIZE\fR;\ default=200\ |\ \fB\-\-pd\-source\-snapshot\fR=\fIPD_SOURCE_SNAPSHOT\fR] [\fIGCLOUD_WIDE_FLAG\ ...\fR]



.SH "DESCRIPTION"

\fB(ALPHA)\fR Create a workstation configuration.



.SH "EXAMPLES"

To create a configuration with the 'e2\-standard\-8' machine type and a IntelliJ
image, run:

.RS 2m
$ gcloud alpha workstations configs create CONFIG \e
    \-\-machine\-type=e2\-standard\-8 \e
    \-\-container\-predefined\-image=intellij
.RE

To create a configuration with a Shielded VM instance that enables Secure Boot,
virtual trusted platform module (vTPM) and integrity monitoring, run:

.RS 2m
$ gcloud alpha workstations configs create CONFIG \e
    \-\-machine\-type=e2\-standard\-4 \-\-shielded\-secure\-boot \e
    \-\-shielded\-vtpm \-\-shielded\-integrity\-monitoring
.RE

To create a configuration with a non\-default persistent disk containing 10GB of
PD SSD storage, run:.RS 2m
$ gcloud alpha workstations configs create CONFIG \e
    \-\-machine\-type=e2\-standard\-4 \-\-pd\-disk\-type=pd\-ssd \e
    \-\-pd\-disk\-size=10

.RE



.SH "POSITIONAL ARGUMENTS"

.RS 2m
.TP 2m

Config resource \- The group of arguments defining a config The arguments in
this group can be used to specify the attributes of this resource. (NOTE) Some
attributes are not given arguments in this group but can be set in other ways.

To set the \f5project\fR attribute:
.RS 2m
.IP "\(em" 2m
provide the argument \f5config\fR on the command line with a fully specified
name;
.IP "\(em" 2m
provide the argument \f5\-\-project\fR on the command line;
.IP "\(em" 2m
set the property \f5core/project\fR.
.RE
.sp

This must be specified.


.RS 2m
.TP 2m
\fICONFIG\fR

ID of the config or fully qualified identifier for the config.

To set the \f5config\fR attribute:
.RS 2m
.IP "\(bu" 2m
provide the argument \f5config\fR on the command line.
.RE
.sp

This positional argument must be specified if any of the other arguments in this
group are specified.

.TP 2m
\fB\-\-cluster\fR=\fICLUSTER\fR

The cluster for the config.

To set the \f5cluster\fR attribute:
.RS 2m
.IP "\(bu" 2m
provide the argument \f5config\fR on the command line with a fully specified
name;
.IP "\(bu" 2m
provide the argument \f5\-\-cluster\fR on the command line;
.IP "\(bu" 2m
set the property \f5workstations/cluster\fR.
.RE
.sp

.TP 2m
\fB\-\-region\fR=\fIREGION\fR

The region for the config.

To set the \f5region\fR attribute:
.RS 2m
.IP "\(bu" 2m
provide the argument \f5config\fR on the command line with a fully specified
name;
.IP "\(bu" 2m
provide the argument \f5\-\-region\fR on the command line;
.IP "\(bu" 2m
set the property \f5workstations/region\fR.
.RE
.sp


.RE
.RE
.sp

.SH "FLAGS"

.RS 2m
.TP 2m
\fB\-\-allow\-unauthenticated\-cors\-preflight\-requests\fR

By default, the workstations service makes sure that all requests to the
workstation are authenticated. CORS preflight requests do not include cookies or
custom headers, and so are considered unauthenticated and blocked by the
workstations service. Enabling this option allows these unauthenticated CORS
preflight requests through to the workstation, where it becomes the
responsibility of the destination server in the workstation to validate the
request

.TP 2m
\fB\-\-allowed\-ports\fR=[\fIALLOWED_PORTS\fR,...]

A Single or Range of ports externally accessible in the workstation. If not
specified defaults to ports 22, 80 and ports 1024\-65535.

To specify a single port, both first and last should be same.

Example:

.RS 2m
$ gcloud alpha workstations configs create \e
    \-\-allowed\-ports=first=9000,last=9090
$ gcloud alpha workstations configs create \e
    \-\-allowed\-ports=first=80,last=80
.RE

Sets \f5allowed_ports\fR value.

.RS 2m
.TP 2m
\fBfirst\fR
Required, sets \f5first\fR value.

.TP 2m
\fBlast\fR
Required, sets \f5last\fR value.

.RE
.sp
\fBShorthand Example:\fR


.RS 2m
\-\-allowed\-ports=first=int,last=int
.RE


\fBJSON Example:\fR


.RS 2m
\-\-allowed\-ports='{"first": int, "last": int}'
.RE


\fBFile Example:\fR


.RS 2m
\-\-allowed\-ports=path_to_file.(yaml|json)
.RE


.TP 2m
\fB\-\-async\fR

Return immediately, without waiting for the operation in progress to complete.

.TP 2m
\fB\-\-boost\-config\fR=[\fIBOOST_CONFIG\fR,...]

Boost Configuration(s) that workstations running with this configuration can
boost up to. This includes id (required), machine\-type, accelerator\-type,
accelerator\-count, pool\-size, boot\-disk\-size, and
enable\-nested\-virtualization.

Example:

.RS 2m
$ gcloud alpha workstations configs create \e
    \-\-boost\-config=id=boost1,machine\-type=n1\-standard\-4,\e
accelerator\-type=nvidia\-tesla\-t4,accelerator\-count=1
.RE

Sets \f5boost_config\fR value.

.RS 2m
.TP 2m
\fBaccelerator\-count\fR
Sets \f5accelerator\-count\fR value.

.TP 2m
\fBaccelerator\-type\fR
Sets \f5accelerator\-type\fR value.

.TP 2m
\fBboot\-disk\-size\fR
Sets \f5boot\-disk\-size\fR value.

.TP 2m
\fBenable\-nested\-virtualization\fR
Sets \f5enable\-nested\-virtualization\fR value.

.TP 2m
\fBid\fR
Required, sets \f5id\fR value.

.TP 2m
\fBmachine\-type\fR
Sets \f5machine\-type\fR value.

.TP 2m
\fBpool\-size\fR
Sets \f5pool\-size\fR value.

.TP 2m
\fBreservation\-affinity\fR
Sets \f5reservation\-affinity\fR value.

.RS 2m
.TP 2m
\fBconsume\-reservation\-type\fR
Sets \f5consume\-reservation\-type\fR value.

.TP 2m
\fBkey\fR
Sets \f5key\fR value.

.TP 2m
\fBvalues\fR
Sets \f5values\fR value.

.RE
.RE
.sp
\fBShorthand Example:\fR


.RS 2m
\-\-boost\-config=accelerator\-count=int,accelerator\-type=string,boot\-disk\-size=int,enable\-nested\-virtualization=boolean,id=string,machine\-type=string,pool\-size=int,reservation\-affinity={consume\-reservation\-type=string,key=string,values}
.RE


\fBJSON Example:\fR


.RS 2m
\-\-boost\-config='{"accelerator\-count": int, "accelerator\-type": "string", "boot\-disk\-size": int, "enable\-nested\-virtualization": boolean, "id": "string", "machine\-type": "string", "pool\-size": int, "reservation\-affinity": {"consume\-reservation\-type": "string", "key": "string", "values"}}'
.RE


\fBFile Example:\fR


.RS 2m
\-\-boost\-config=path_to_file.(yaml|json)
.RE


.TP 2m
\fB\-\-boot\-disk\-size\fR=\fIBOOT_DISK_SIZE\fR; default=50

Size of the boot disk in GB.

.TP 2m
\fB\-\-container\-args\fR=[\fICONTAINER_ARGS\fR,...]

Arguments passed to the entrypoint.

Example:

.RS 2m
$ gcloud alpha workstations configs create \e
    \-\-container\-args=arg_1,arg_2
.RE

.TP 2m
\fB\-\-container\-command\fR=[\fICONTAINER_COMMAND\fR,...]

If set, overrides the default ENTRYPOINT specified by the image.

Example:

.RS 2m
$ gcloud alpha workstations configs create \e
    \-\-container\-command=executable,parameter_1,parameter_2
.RE

.TP 2m
\fB\-\-container\-env\fR=[\fICONTAINER_ENV\fR,...]

Environment variables passed to the container.

Example:

.RS 2m
$ gcloud alpha workstations configs create \e
    \-\-container\-env=key1=value1,key2=value2
.RE

.TP 2m
\fB\-\-container\-run\-as\-user\fR=\fICONTAINER_RUN_AS_USER\fR

If set, overrides the USER specified in the image with the given uid.

.TP 2m
\fB\-\-container\-working\-dir\fR=\fICONTAINER_WORKING_DIR\fR

If set, overrides the default DIR specified by the image.

.TP 2m
\fB\-\-disable\-localhost\-replacement\fR

By default, the workstations service replaces references to localhost,
127.0.0.1, and 0.0.0.0 with the workstation's hostname in http responses from
the workstation so that applications under development run properly on the
workstation. This may intefere with some applications, and so this option allows
that behavior to be disabled.

.TP 2m
\fB\-\-disable\-public\-ip\-addresses\fR

Default value is false. If set, instances will have no public IP address.

.TP 2m
\fB\-\-disable\-ssh\-to\-vm\fR

(DEPRECATED) Default value is False. If set, workstations disable SSH
connections to the root VM.

The \-\-disable\-ssh\-to\-vm option is deprecated; use \-\-enable\-ssh\-to\-vm
instead.

.TP 2m
\fB\-\-disable\-tcp\-connections\fR

Default value is false. If set, workstations don't allow plain TCP connections.

.TP 2m
\fB\-\-enable\-audit\-agent\fR

Whether to enable Linux \f5auditd\fR logging on the workstation. When enabled, a
service account must also be specified that has \f5logging.buckets.write\fR
permission on the project.

.TP 2m
\fB\-\-enable\-confidential\-compute\fR

Default value is false. If set, instances will have confidential compute
enabled.

.TP 2m
\fB\-\-enable\-nested\-virtualization\fR

Default value is false. If set, instances will have nested virtualization
enabled.

.TP 2m
\fB\-\-enable\-ssh\-to\-vm\fR

Default value is False. If set, workstations enable SSH connections to the root
VM.

.TP 2m
\fB\-\-ephemeral\-directory\fR=[\fIPROPERTY\fR=\fIVALUE\fR,...]

Ephemeral directory which won't persist across workstation sessions. An
ephemeral directory is backed by a Compute Engine persistent disk whose
mount\-path, source\-snapshot, source\-image, and read\-only are configurable.

.RS 2m
.TP 2m
\fBmount\-path\fR
Location of this directory in the running workstation.

.TP 2m
\fBsource\-snapshot
Name of the snapshot to use as the source for the disk. Must be empty if
[source_image][] is set. Must be empty if [read_only][] is false. Updating
[source_snapshot][] will update content in the ephemeral directory after the
workstation is restarted.

.TP 2m
\fRsource\-image
Name of the disk image to use as the source for the disk. Must be empty if
[source_snapshot][] is set. Updating [source_image][] will update content in the
ephemeral directory after the workstation is restarted.

.TP 2m
\fBread\-only
Whether the disk is read only. If true, the disk may be shared by multiple VMs
and [source_snapshot][] must be set. Set to false when not specified and true
when specified.

Example:

.RS 2m
$ gcloud alpha workstations configs create \e
    \-\-ephemeral\-directory="mount\-path=/home2,disk\-type=pd\-balanced,s\e
ource\-snapshot=projects/my\-project/global/snapshots/snapshot,read\-on\e
ly=true"
.RE

.RE
.sp
.TP 2m
\fR\-\-grant\-workstation\-admin\-role\-on\-create\fB

Default value is false. If set, creator of a workstation will get
\f5roles/workstations.policyAdmin\fR role along with
\f5roles/workstations.user\fR role on the workstation created by them.

.TP 2m
\fR\-\-idle\-timeout\fB=\fIIDLE_TIMEOUT\fR; default=7200

How long (in seconds) to wait before automatically stopping an instance that
hasn't received any user traffic. A value of 0 indicates that this instance
should never time out due to idleness.

.TP 2m
\fR\-\-labels\fB=[\fILABELS\fR,...]

Labels that are applied to the configuration and propagated to the underlying
Compute Engine resources.

Example:

.RS 2m
$ gcloud alpha workstations configs create \e
    \-\-labels=label1=value1,label2=value2
.RE

.TP 2m
\fR\-\-machine\-type\fB=\fIMACHINE_TYPE\fR; default="e2\-standard\-4"

Machine type determines the specifications of the Compute Engine machines that
the workstations created under this configuration will run on.

.TP 2m
\fR\-\-max\-usable\-workstations\-count\fB=\fIMAX_USABLE_WORKSTATIONS_COUNT\fR

Maximum number of workstations under this configuration a user can have
\f5workstations.workstation.use\fR permission on.

If not specified, defaults to \f50\fR, which indicates a user can have unlimited
number of workstations under this configuration.

.TP 2m
\fR\-\-network\-tags\fB=[\fINETWORK_TAGS\fR,...]

Network tags to add to the Google Compute Engine machines backing the
Workstations.

Example:

.RS 2m
$ gcloud alpha workstations configs create \-\-network\-tags=tag_1,tag_2
.RE

.TP 2m
\fR\-\-pool\-size\fB=\fIPOOL_SIZE\fR

Number of instances to pool for faster Workstation startup.

.TP 2m
\fR\-\-replica\-zones\fB=[\fIREPLICA_ZONES\fR,...]

Specifies the zones the VM and disk resources will be replicated within the
region. If set, exactly two zones within the workstation cluster's region must
be specified.

Example:

.RS 2m
$ gcloud alpha workstations configs create \e
    \-\-replica\-zones=us\-central1\-a,us\-central1\-f
.RE

.TP 2m
\fR\-\-reservation\-affinity\fB=[\fIRESERVATION_AFFINITY\fR,...]

Reservation Affinity for the VM. This includes key, values, and
consumeReservationType.

Example: $ gcloud alpha workstations configs create \e
\-\-reservation\-affinity=key=compute.googleapis.com/\e
reservation\-name,consumeReservationType=SPECIFIC_RESERVATION,\e
values=my\-reservation

Sets \f5reservation_affinity\fR value.

.RS 2m
.TP 2m
\fRconsume\-reservation\-type\fB
Sets \f5consume\-reservation\-type\fR value.

.TP 2m
\fRkey\fB
Sets \f5key\fR value.

.TP 2m
\fRvalues\fB
Sets \f5values\fR value.

.RE
.sp
\fRShorthand Example:\fB


.RS 2m
\-\-reservation\-affinity=consume\-reservation\-type=string,key=string,values
.RE


\fRJSON Example:\fB


.RS 2m
\-\-reservation\-affinity='{"consume\-reservation\-type": "string", "key": "string", "values"}'
.RE


\fRFile Example:\fB


.RS 2m
\-\-reservation\-affinity=path_to_file.(yaml|json)
.RE


.TP 2m
\fR\-\-running\-timeout\fB=\fIRUNNING_TIMEOUT\fR; default=7200

How long (in seconds) to wait before automatically stopping a workstation after
it started. A value of 0 indicates that workstations using this config should
never time out.

.TP 2m
\fR\-\-service\-account\fB=\fISERVICE_ACCOUNT\fR

Email address of the service account that will be used on VM instances used to
support this config. This service account must have permission to pull the
specified container image. If not set, VMs will run without a service account,
in which case the image must be publicly accessible.

.TP 2m
\fR\-\-service\-account\-scopes\fB=[\fISERVICE_ACCOUNT_SCOPES\fR,...]

Scopes to grant to the service_account. Various scopes are automatically added
based on feature usage. When specified, users of workstations under this
configuration must have iam.serviceAccounts.actAs\f5 on the service account.

.TP 2m
\fR\-\-shielded\-integrity\-monitoring\fB

Default value is false. If set, instances will have integrity monitoring
enabled.

.TP 2m
\fR\-\-shielded\-secure\-boot\fB

Default value is false. If set, instances will have Secure Boot enabled.

.TP 2m
\fR\-\-shielded\-vtpm\fB

Default value is false. If set, instances will have vTPM enabled.

.TP 2m
\fR\-\-vm\-tags\fB=[\fIVM_TAGS\fR,...]

Resource manager tags to be bound to the instance. Tag keys and values have the
same definition as
https://cloud.google.com/resource\-manager/docs/tags/tags\-overview

Example:

.RS 2m
$ gcloud alpha workstations configs create \e
    \-\-vm\-tags=tagKeys/key1=tagValues/value1,tagKeys/key2=tagValues/\e
value2
.RE

.TP 2m

Accelerator settings


.RS 2m
.TP 2m
\fR\-\-accelerator\-count\fB=\fIACCELERATOR_COUNT\fR

The number of accelerator cards exposed to the instance.

This flag argument must be specified if any of the other arguments in this group
are specified.

.TP 2m
\fR\-\-accelerator\-type\fB=\fIACCELERATOR_TYPE\fR

The type of accelerator resource to attach to the instance, for example,
"nvidia\-tesla\-p100".

.RE
.sp
.TP 2m

At most one of these can be specified:


.RS 2m
.TP 2m
\fR\-\-container\-custom\-image\fB=\fICONTAINER_CUSTOM_IMAGE\fR

A docker image for the workstation. This image must be accessible by the service
account configured in this configuration (\-\-service\-account). If no service
account is defined, this image must be public.

.TP 2m
\fR\-\-container\-predefined\-image\fB=\fICONTAINER_PREDEFINED_IMAGE\fR; default="codeoss"

Code editor on base images. \fICONTAINER_PREDEFINED_IMAGE\fR must be one of:

.RS 2m
.TP 2m
\fRbase\-image\fB
Base image \- no IDE
.TP 2m
\fRclion\fB
CLion
.TP 2m
\fRcodeoss\fB
Code OSS
.TP 2m
\fRcodeoss\-cuda\fB
Code OSS + CUDA toolkit
.TP 2m
\fRgoland\fB
GoLand
.TP 2m
\fRintellij\fB
IntelliJ IDEA Ultimate
.TP 2m
\fRphpstorm\fB
PhpStorm
.TP 2m
\fRpycharm\fB
PyCharm Professional
.TP 2m
\fRrider\fB
Rider
.TP 2m
\fRrubymine\fB
RubyMine
.TP 2m
\fRwebstorm\fB
WebStorm
.RE
.sp


.RE
.sp
.TP 2m

Encryption key settings


.RS 2m
.TP 2m
\fR\-\-kms\-key\fB=\fIKMS_KEY\fR

The customer\-managed encryption key to use for this config. If not specified, a
Google\-managed encryption key is used.

This flag argument must be specified if any of the other arguments in this group
are specified.

.TP 2m
\fR\-\-kms\-key\-service\-account\fB=\fIKMS_KEY_SERVICE_ACCOUNT\fR

The service account associated with the provided customer\-managed encryption
key.

.RE
.sp
.TP 2m

At most one of these can be specified:


.RS 2m
.TP 2m
\fR\-\-no\-persistent\-storage\fB

If set, workstations under this configuration will not have a persistent
directory.

.TP 2m

Persistent directory configuration.


.RS 2m
.TP 2m
\fR\-\-pd\-disk\-type\fB=\fIPD_DISK_TYPE\fR; default="pd\-standard"

Type of the persistent directory. \fIPD_DISK_TYPE\fR must be one of:
\fRpd\-standard\fB, \fRpd\-balanced\fB, \fRpd\-ssd\fB.

.TP 2m
\fR\-\-pd\-reclaim\-policy\fB=\fIPD_RECLAIM_POLICY\fR; default="delete"

What should happen to the disk after the Workstation is deleted.
\fIPD_RECLAIM_POLICY\fR must be one of:

.RS 2m
.TP 2m
\fRdelete\fB
The persistent disk will be deleted with the Workstation.
.TP 2m
\fRretain\fB
The persistent disk will be remain after the workstation is deleted and the
administrator must manually delete the disk.
.RE
.sp


.TP 2m

At most one of these can be specified:


.RS 2m
.TP 2m
\fR\-\-pd\-disk\-size\fB=\fIPD_DISK_SIZE\fR; default=200

Size of the persistent directory in GB. \fIPD_DISK_SIZE\fR must be one of:
\fR10\fB, \fR50\fB, \fR100\fB, \fR200\fB, \fR500\fB, \fR1000\fB.

.TP 2m
\fR\-\-pd\-source\-snapshot\fB=\fIPD_SOURCE_SNAPSHOT\fR

Name of the snapshot to use as the source for the home disk.


\fR
.RE
.RE
.RE
.RE
.sp

.SH "GCLOUD WIDE FLAGS"

These flags are available to all commands: \-\-access\-token\-file, \-\-account,
\-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten,
\-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http,
\-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled,
\-\-verbosity.

Run \fB$ gcloud help\fR for details.



.SH "NOTES"

This command is currently in alpha and might change without notice. If this
command fails with API permission errors despite specifying the correct project,
you might be trying to access an API with an invitation\-only early access
allowlist. These variants are also available:

.RS 2m
$ gcloud workstations configs create
.RE

.RS 2m
$ gcloud beta workstations configs create
.RE