gcloud container hub create

NAME
gcloud container hub create - create a fleet
SYNOPSIS
gcloud container hub create[--async][--display-name=DISPLAY_NAME][--labels=[KEY=VALUE,…]][--binauthz-evaluation-mode=BINAUTHZ_EVALUATION_MODE--binauthz-policy-bindings=[name=BINAUTHZ_POLICY]--security-posture=SECURITY_POSTURE--workload-vulnerability-scanning=WORKLOAD_VULNERABILITY_SCANNING][GCLOUD_WIDE_FLAG]
DESCRIPTION
This command can fail for the following reasons:
  • The project specified does not exist.
  • The project specified already has a fleet.
  • The active account does not have permission to access the given project.
EXAMPLES
To create a fleet in projectexample-foo-bar-1 with display namemy-fleet, run:
gcloudcontainerhubcreate--display-name=my-fleet--project=example-foo-bar-1
FLAGS
--async
Return immediately, without waiting for the operation in progress to complete.
--display-name=DISPLAY_NAME
Display name of the fleet to be created (optional). 4-30 characters,alphanumeric and [ '"!-] only.
--labels=[KEY=VALUE,…]
List of label KEY=VALUE pairs to add.

Keys must start with a lowercase character and contain only hyphens(-), underscores (_), lowercase characters, andnumbers. Values must contain only hyphens (-), underscores(_), lowercase characters, and numbers.

Default cluster configurations to apply across the fleet.
Binary Authorization config.
--binauthz-evaluation-mode=BINAUTHZ_EVALUATION_MODE
Configure binary authorization mode for clusters to onboard the fleet,
gcloudcontainerhubcreate--binauthz-evaluation-mode=policy-bindings

BINAUTHZ_EVALUATION_MODE must be one of:disabled,policy-bindings.

--binauthz-policy-bindings=[name=BINAUTHZ_POLICY]
The relative resource name of the Binary Authorization policy to audit and/orenforce. GKE policies have the following format:projects/{project_number}/platforms/gke/policies/{policy_id}.
Security posture config.
--security-posture=SECURITY_POSTURE
To apply standard security posture to clusters in the fleet,
gcloudcontainerhubcreate--security-posture=standard

SECURITY_POSTURE must be one of:disabled,standard,enterprise.

--workload-vulnerability-scanning=WORKLOAD_VULNERABILITY_SCANNING
To apply standard vulnerability scanning to clusters in the fleet,
gcloudcontainerhubcreate--workload-vulnerability-scanning=standard

WORKLOAD_VULNERABILITY_SCANNING must be one of:disabled,standard,enterprise.

GCLOUD WIDE FLAGS
These flags are available to all commands:--access-token-file,--account,--billing-project,--configuration,--flags-file,--flatten,--format,--help,--impersonate-service-account,--log-http,--project,--quiet,--trace-token,--user-output-enabled,--verbosity.

Run$gcloud help for details.

NOTES
These variants are also available:
gcloudalphacontainerhubcreate
gcloudbetacontainerhubcreate

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2025-05-07 UTC.