gcloud alpha container hub create

NAME
gcloud alpha container hub create - create a fleet
SYNOPSIS
gcloud alpha container hub create[--async][--display-name=DISPLAY_NAME][--labels=[KEY=VALUE,…]][--binauthz-evaluation-mode=BINAUTHZ_EVALUATION_MODE--binauthz-policy-bindings=[name=BINAUTHZ_POLICY]--security-posture=SECURITY_POSTURE--workload-vulnerability-scanning=WORKLOAD_VULNERABILITY_SCANNING][GCLOUD_WIDE_FLAG]
DESCRIPTION
(ALPHA) This command can fail for the following reasons:
  • The project specified does not exist.
  • The project specified already has a fleet.
  • The active account does not have permission to access the given project.
EXAMPLES
To create a fleet in projectexample-foo-bar-1 with display namemy-fleet, run:
gcloudalphacontainerhubcreate--display-name=my-fleet--project=example-foo-bar-1
FLAGS
--async
Return immediately, without waiting for the operation in progress to complete.
--display-name=DISPLAY_NAME
Display name of the fleet to be created (optional). 4-30 characters,alphanumeric and [ '"!-] only.
--labels=[KEY=VALUE,…]
List of label KEY=VALUE pairs to add.

Keys must start with a lowercase character and contain only hyphens(-), underscores (_), lowercase characters, andnumbers. Values must contain only hyphens (-), underscores(_), lowercase characters, and numbers.

Default cluster configurations to apply across the fleet.
Binary Authorization config.
--binauthz-evaluation-mode=BINAUTHZ_EVALUATION_MODE
Configure binary authorization mode for clusters to onboard the fleet,
gcloudalphacontainerhubcreate--binauthz-evaluation-mode=policy-bindings

BINAUTHZ_EVALUATION_MODE must be one of:disabled,policy-bindings.

--binauthz-policy-bindings=[name=BINAUTHZ_POLICY]
The relative resource name of the Binary Authorization policy to audit and/orenforce. GKE policies have the following format:projects/{project_number}/platforms/gke/policies/{policy_id}.
Security posture config.
--security-posture=SECURITY_POSTURE
To apply standard security posture to clusters in the fleet,
gcloudalphacontainerhubcreate--security-posture=standard

SECURITY_POSTURE must be one of:disabled,standard,enterprise.

--workload-vulnerability-scanning=WORKLOAD_VULNERABILITY_SCANNING
To apply standard vulnerability scanning to clusters in the fleet,
gcloudalphacontainerhubcreate--workload-vulnerability-scanning=standard

WORKLOAD_VULNERABILITY_SCANNING must be one of:disabled,standard,enterprise.

GCLOUD WIDE FLAGS
These flags are available to all commands:--access-token-file,--account,--billing-project,--configuration,--flags-file,--flatten,--format,--help,--impersonate-service-account,--log-http,--project,--quiet,--trace-token,--user-output-enabled,--verbosity.

Run$gcloud help for details.

NOTES
This command is currently in alpha and might change without notice. If thiscommand fails with API permission errors despite specifying the correct project,you might be trying to access an API with an invitation-only early accessallowlist. These variants are also available:
gcloudcontainerhubcreate
gcloudbetacontainerhubcreate

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2025-05-07 UTC.