HEX
Server: Apache/2.4.65 (Ubuntu)
System: Linux ielts-store-v2 6.8.0-1036-gcp #38~22.04.1-Ubuntu SMP Thu Aug 14 01:19:18 UTC 2025 x86_64
User: root (0)
PHP: 7.2.34-54+ubuntu20.04.1+deb.sury.org+1
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
Upload Files
File: //snap/google-cloud-cli/current/help/man/man1/gcloud_beta_model-armor_floorsettings_update.1
.TH "GCLOUD_BETA_MODEL\-ARMOR_FLOORSETTINGS_UPDATE" 1



.SH "NAME"
.HP
gcloud beta model\-armor floorsettings update \- update the FloorSetting resource



.SH "SYNOPSIS"
.HP
\f5gcloud beta model\-armor floorsettings update\fR \fB\-\-full\-uri\fR=\fIFULL_URI\fR [\fB\-\-enable\-floor\-setting\-enforcement\fR=\fIENABLE_FLOOR_SETTING_ENFORCEMENT\fR] [\fB\-\-malicious\-uri\-filter\-settings\-enforcement\fR=\fIMALICIOUS_URI_FILTER_SETTINGS_ENFORCEMENT\fR] [\fB\-\-add\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR] | \fB\-\-clear\-rai\-settings\-filters\fR | \fB\-\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR]\ |\ \fB\-\-remove\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR]]\ [\fB\-\-advanced\-config\-deidentify\-template\fR=\fIADVANCED_CONFIG_DEIDENTIFY_TEMPLATE\fR\ \fB\-\-advanced\-config\-inspect\-template\fR=\fIADVANCED_CONFIG_INSPECT_TEMPLATE\fR\ \fB\-\-basic\-config\-filter\-enforcement\fR=\fIBASIC_CONFIG_FILTER_ENFORCEMENT\fR]\ [\fB\-\-pi\-and\-jailbreak\-filter\-settings\-confidence\-level\fR=\fIPI_AND_JAILBREAK_FILTER_SETTINGS_CONFIDENCE_LEVEL\fR\ \fB\-\-pi\-and\-jailbreak\-filter\-settings\-enforcement\fR=\fIPI_AND_JAILBREAK_FILTER_SETTINGS_ENFORCEMENT\fR]\ [\fIGCLOUD_WIDE_FLAG\ ...\fR]



.SH "DESCRIPTION"

\fB(BETA)\fR Updates the floor setting resource with the given name.



.SH "REQUIRED FLAGS"

.RS 2m
.TP 2m
\fB\-\-full\-uri\fR=\fIFULL_URI\fR

Full uri of the floor setting


.RE
.sp

.SH "OPTIONAL FLAGS"

.RS 2m
.TP 2m
\fB\-\-enable\-floor\-setting\-enforcement\fR=\fIENABLE_FLOOR_SETTING_ENFORCEMENT\fR

Enable or disable the floor setting enforcement

.TP 2m

Malicious uri filter settings.


.RS 2m
.TP 2m
\fB\-\-malicious\-uri\-filter\-settings\-enforcement\fR=\fIMALICIOUS_URI_FILTER_SETTINGS_ENFORCEMENT\fR

Malicious URI filter settings.

.RE
.sp
.TP 2m

RAI filter settings.

At most one of these can be specified:


.RS 2m
.TP 2m
\fB\-\-add\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR]

Add rai filter settings. Sets \f5add_rai_settings_filters\fR value.

\fBShorthand Example:\fR


.RS 2m
\-\-add\-rai\-settings\-filters=string,string
.RE


\fBJSON Example:\fR


.RS 2m
\-\-add\-rai\-settings\-filters=["string"]
.RE


\fBFile Example:\fR


.RS 2m
\-\-add\-rai\-settings\-filters=path_to_file.(yaml|json)
.RE


.TP 2m
\fB\-\-clear\-rai\-settings\-filters\fR

Clear all rai filter settings.

.TP 2m
\fB\-\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR]

Set rai_settings_filters to new value. List of Responsible AI filters enabled
for floor setting. Sets \f5rai_settings_filters\fR value.

\fBShorthand Example:\fR


.RS 2m
\-\-rai\-settings\-filters=string,string
.RE


\fBJSON Example:\fR


.RS 2m
\-\-rai\-settings\-filters=["string"]
.RE


\fBFile Example:\fR


.RS 2m
\-\-rai\-settings\-filters=path_to_file.(yaml|json)
.RE


.TP 2m
\fB\-\-remove\-rai\-settings\-filters\fR=\fIconfidenceLevel\fR=\fICONFIDENCELEVEL\fR],[\fIfilterType\fR=\fIFILTERTYPE\fR]

Remove rai filter settings. Sets \f5remove_rai_settings_filters\fR value.

\fBShorthand Example:\fR


.RS 2m
\-\-remove\-rai\-settings\-filters=string,string
.RE


\fBJSON Example:\fR


.RS 2m
\-\-remove\-rai\-settings\-filters=["string"]
.RE


\fBFile Example:\fR


.RS 2m
\-\-remove\-rai\-settings\-filters=path_to_file.(yaml|json)
.RE


.RE
.sp
.TP 2m

SDP filter settings.


.RS 2m
.TP 2m
\fB\-\-advanced\-config\-deidentify\-template\fR=\fIADVANCED_CONFIG_DEIDENTIFY_TEMPLATE\fR

The sdp filter settings enforcement. The value can be either "enable" or
"disable".

.TP 2m
\fB\-\-advanced\-config\-inspect\-template\fR=\fIADVANCED_CONFIG_INSPECT_TEMPLATE\fR

The sdp filter settings enforcement. The value can be either "enable" or
"disable".

.TP 2m
\fB\-\-basic\-config\-filter\-enforcement\fR=\fIBASIC_CONFIG_FILTER_ENFORCEMENT\fR

The sdp filter settings enforcement. The value can be either "ENABLED" or
"DISABLED"

.RE
.sp
.TP 2m

PI and jailbreak filter settings.


.RS 2m
.TP 2m
\fB\-\-pi\-and\-jailbreak\-filter\-settings\-confidence\-level\fR=\fIPI_AND_JAILBREAK_FILTER_SETTINGS_CONFIDENCE_LEVEL\fR

The pi and jailbreak filter settings confidence level. The value can be either
"high", "medium\-and\-above" or "low\-and\-above"

.TP 2m
\fB\-\-pi\-and\-jailbreak\-filter\-settings\-enforcement\fR=\fIPI_AND_JAILBREAK_FILTER_SETTINGS_ENFORCEMENT\fR

The pi and jailbreak filter settings enforcement. The value can be either
"enable" or "disable".


.RE
.RE
.sp

.SH "GCLOUD WIDE FLAGS"

These flags are available to all commands: \-\-access\-token\-file, \-\-account,
\-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten,
\-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http,
\-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled,
\-\-verbosity.

Run \fB$ gcloud help\fR for details.



.SH "NOTES"

This command is currently in beta and might change without notice. These
variants are also available:

.RS 2m
$ gcloud model\-armor floorsettings update
.RE

.RS 2m
$ gcloud alpha model\-armor floorsettings update
.RE