HEX
Server: Apache/2.4.65 (Ubuntu)
System: Linux ielts-store-v2 6.8.0-1036-gcp #38~22.04.1-Ubuntu SMP Thu Aug 14 01:19:18 UTC 2025 x86_64
User: root (0)
PHP: 7.2.34-54+ubuntu20.04.1+deb.sury.org+1
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
Upload Files
File: //snap/google-cloud-cli/current/lib/surface/scc/custom_modules/etd/get_effective.yaml
- release_tracks: [ALPHA]

  help_text:
    brief: Get the details of a Event Threat Detection custom module with effective enablement state.
    description: |
      Get the details of a Event Threat Detection custom module. For inherited custom modules,
      the get-effective command resolves INHERITED enablement states to ENABLED or DISABLED.
      For example, if an inherited custom module is enabled at the ancestor level, then the
      get-effective command displays the enablement state as ENABLED instead of INHERITED in a
      child folder or project.
    examples: |
      To get the details of a Event Threat Detection custom module 123456 with its effective enablement state
      from organization `123`, run:

        $ {command} 123456 --organization=organizations/123

      To get the details of a Event Threat Detection custom module 123456 with its effective enablement state
      from folder `456`, run:

        $ {command} 123456 --folder=folders/456

      To get the details of a Event Threat Detection custom module 123456 with its effective enablement state
      from project `789`, run:

        $ {command} 123456 --project=projects/789

  request:
    collection: securitycenter.organizations.eventThreatDetectionSettings.effectiveCustomModules
    disable_resource_check: true
    api_version: v1
    method: get
    modify_request_hooks:
    - googlecloudsdk.command_lib.scc.custom_modules.etd.request_hooks:GetEffectiveEventThreatDetectionCustomModuleReqHook

  arguments:

    params:
    - arg_name: custom_module
      api_field: name
      is_positional: true
      required: true
      help_text: |
        ID or the full resource name of the effective Event Threat Detection custom module. If you specify the full resource name, you do not need to specify the --organization, --folder, or --project flags.

    - group:
        mutex: true
        params:
        - arg_name: organization
          api_field: name
          help_text: |
            Organization from which to get the custom module details. Formatted as
            `organizations/123` or just `123`.

        - arg_name: folder
          api_field: name
          help_text: |
            Folder from which to get the custom module details. Formatted as `folders/456`
            or just `456`.

        - arg_name: project
          api_field: name
          help_text: |
            ID or number of the project from which to get the custom module details. Formatted as
            `projects/789` or just `789`.