HEX
Server: Apache/2.4.65 (Ubuntu)
System: Linux ielts-store-v2 6.8.0-1036-gcp #38~22.04.1-Ubuntu SMP Thu Aug 14 01:19:18 UTC 2025 x86_64
User: root (0)
PHP: 7.2.34-54+ubuntu20.04.1+deb.sury.org+1
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
Upload Files
File: //snap/google-cloud-cli/current/help/man/man1/gcloud_org-policies_set-policy.1
.TH "GCLOUD_ORG\-POLICIES_SET\-POLICY" 1



.SH "NAME"
.HP
gcloud org\-policies set\-policy \- set an organization policy from a JSON or YAML file



.SH "SYNOPSIS"
.HP
\f5gcloud org\-policies set\-policy\fR \fIPOLICY_FILE\fR [\fB\-\-update\-mask\fR=\fIUPDATE_MASK\fR] [\fIGCLOUD_WIDE_FLAG\ ...\fR]



.SH "DESCRIPTION"

Sets an organization policy from a JSON or YAML file. The policy will be created
if it does not exist, or updated if it already exists.



.SH "EXAMPLES"

Organization policy list constraint YAML file example:

.RS 2m
name: projects/PROJECT_ID/policies/CONSTRAINT_NAME
spec:
  rules:
  \- values:
    denied_values:
    \- VALUE_A
.RE

Organization policy list constraint JSON file example:

.RS 2m
{
  "name": "projects/PROJECT_ID/policies/CONSTRAINT_NAME",
  "spec": {
    "rules": [
      {
        "values": {
            "deniedValues": ["VALUE_A"]
        }
      }
    ]
  }
}
.RE

To set the policy from the file on the path './sample_path', run:

.RS 2m
$ gcloud org\-policies set\-policy ./sample_path
.RE



.SH "POSITIONAL ARGUMENTS"

.RS 2m
.TP 2m
\fIPOLICY_FILE\fR

Path to JSON or YAML file that contains the organization policy.


.RE
.sp

.SH "FLAGS"

.RS 2m
.TP 2m
\fB\-\-update\-mask\fR=\fIUPDATE_MASK\fR

Field mask used to specify the fields to be overwritten in the policy by the
set. The fields specified in the update_mask are relative to the policy, not the
full request. The update\-mask flag can be empty, or have values
\f5policy.spec\fR, \f5policy.dry_run_spec\fR or \f5*\fR. If the policy does not
contain the dry_run_spec and update\-mask flag is not provided, then it defaults
to \f5policy.spec\fR.


.RE
.sp

.SH "GCLOUD WIDE FLAGS"

These flags are available to all commands: \-\-access\-token\-file, \-\-account,
\-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten,
\-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http,
\-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled,
\-\-verbosity.

Run \fB$ gcloud help\fR for details.