File: //snap/google-cloud-cli/current/help/man/man1/gcloud_beta_asset_analyze-org-policies.1
.TH "GCLOUD_BETA_ASSET_ANALYZE\-ORG\-POLICIES" 1
.SH "NAME"
.HP
gcloud beta asset analyze\-org\-policies \- analyze organization policies under a scope
.SH "SYNOPSIS"
.HP
\f5gcloud beta asset analyze\-org\-policies\fR \fB\-\-constraint\fR=\fICONSTRAINT\fR \fB\-\-scope\fR=\fISCOPE\fR [\fB\-\-filter\fR=\fIEXPRESSION\fR] [\fB\-\-limit\fR=\fILIMIT\fR] [\fB\-\-page\-size\fR=\fIPAGE_SIZE\fR] [\fB\-\-sort\-by\fR=[\fIFIELD\fR,...]] [\fIGCLOUD_WIDE_FLAG\ ...\fR]
.SH "DESCRIPTION"
\fB(BETA)\fR Analyze organization policies under a scope.
.SH "EXAMPLES"
To list 10 organization policies of a constraint in an organization, run:
.RS 2m
$ gcloud beta asset analyze\-org\-policies \e
\-\-scope=organizations/YOUR_ORG_ID \e
\-\-constraint=YOUR_CONSTRAINT_NAME \-\-limit=10
.RE
.SH "REQUIRED FLAGS"
.RS 2m
.TP 2m
\fB\-\-constraint\fR=\fICONSTRAINT\fR
The name of the constraint to analyze organization policies for. The response
only contains analyzed organization policies for the provided constraint.
Example:
.RS 2m
.IP "\(em" 2m
organizations/{ORGANIZATION_NUMBER}/customConstraints/{CUSTOM_CONSTRAINT_NAME}
for a user\-defined custom constraint.
.RE
.sp
.TP 2m
\fB\-\-scope\fR=\fISCOPE\fR
Scope can only be an organization. The analysis is limited to the Cloud
organization policies within this scope. The caller must be granted the
\f5cloudasset.assets.searchAllResources\fR permission on the desired scope.
The allowed values are:
.RS 2m
.IP "\(em" 2m
\f5organizations/{ORGANIZATION_NUMBER}\fR (e.g.
\f5\fIorganizations/123456\fR\fR)
.RE
.sp
.RE
.sp
.SH "LIST COMMAND FLAGS"
.RS 2m
.TP 2m
\fB\-\-filter\fR=\fIEXPRESSION\fR
Apply a Boolean filter \fIEXPRESSION\fR to each resource item to be listed. If
the expression evaluates \f5True\fR, then that item is listed. For more details
and examples of filter expressions, run $ gcloud topic filters. This flag
interacts with other flags that are applied in this order: \fB\-\-flatten\fR,
\fB\-\-sort\-by\fR, \fB\-\-filter\fR, \fB\-\-limit\fR.
.TP 2m
\fB\-\-limit\fR=\fILIMIT\fR
Maximum number of resources to list. The default is \fBunlimited\fR. This flag
interacts with other flags that are applied in this order: \fB\-\-flatten\fR,
\fB\-\-sort\-by\fR, \fB\-\-filter\fR, \fB\-\-limit\fR.
.TP 2m
\fB\-\-page\-size\fR=\fIPAGE_SIZE\fR
Some services group resource list output into pages. This flag specifies the
maximum number of resources per page. The default is determined by the service
if it supports paging, otherwise it is \fBunlimited\fR (no paging). Paging may
be applied before or after \fB\-\-filter\fR and \fB\-\-limit\fR depending on the
service.
.TP 2m
\fB\-\-sort\-by\fR=[\fIFIELD\fR,...]
Comma\-separated list of resource field key names to sort by. The default order
is ascending. Prefix a field with ``~'' for descending order on that field. This
flag interacts with other flags that are applied in this order:
\fB\-\-flatten\fR, \fB\-\-sort\-by\fR, \fB\-\-filter\fR, \fB\-\-limit\fR.
.RE
.sp
.SH "GCLOUD WIDE FLAGS"
These flags are available to all commands: \-\-access\-token\-file, \-\-account,
\-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten,
\-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http,
\-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled,
\-\-verbosity.
Run \fB$ gcloud help\fR for details.
.SH "NOTES"
This command is currently in beta and might change without notice. These
variants are also available:
.RS 2m
$ gcloud asset analyze\-org\-policies
.RE
.RS 2m
$ gcloud alpha asset analyze\-org\-policies
.RE