pulumi-gcp 8.42.0a1758178363__py3-none-any.whl → 9.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +83 -48
- pulumi_gcp/activedirectory/peering.py +16 -0
- pulumi_gcp/alloydb/backup.py +8 -4
- pulumi_gcp/alloydb/cluster.py +56 -10
- pulumi_gcp/alloydb/get_cluster.py +12 -1
- pulumi_gcp/alloydb/instance.py +10 -4
- pulumi_gcp/alloydb/user.py +8 -4
- pulumi_gcp/apigateway/api_config_iam_binding.py +4 -4
- pulumi_gcp/apigateway/api_config_iam_member.py +4 -4
- pulumi_gcp/apigateway/api_config_iam_policy.py +4 -4
- pulumi_gcp/apigateway/api_iam_binding.py +4 -4
- pulumi_gcp/apigateway/api_iam_member.py +4 -4
- pulumi_gcp/apigateway/api_iam_policy.py +4 -4
- pulumi_gcp/apigateway/gateway_iam_binding.py +4 -4
- pulumi_gcp/apigateway/gateway_iam_member.py +4 -4
- pulumi_gcp/apigateway/gateway_iam_policy.py +4 -4
- pulumi_gcp/apigee/_inputs.py +151 -108
- pulumi_gcp/apigee/keystores_aliases_key_cert_file.py +52 -40
- pulumi_gcp/apigee/outputs.py +92 -88
- pulumi_gcp/artifactregistry/__init__.py +2 -0
- pulumi_gcp/artifactregistry/_inputs.py +0 -12
- pulumi_gcp/artifactregistry/get_npm_package.py +251 -0
- pulumi_gcp/artifactregistry/get_python_package.py +237 -0
- pulumi_gcp/artifactregistry/get_repository.py +12 -1
- pulumi_gcp/artifactregistry/outputs.py +8 -16
- pulumi_gcp/artifactregistry/repository.py +28 -0
- pulumi_gcp/backupdisasterrecovery/__init__.py +1 -0
- pulumi_gcp/backupdisasterrecovery/backup_plan.py +4 -4
- pulumi_gcp/backupdisasterrecovery/get_backup.py +12 -1
- pulumi_gcp/backupdisasterrecovery/get_backup_plan_association.py +4 -0
- pulumi_gcp/backupdisasterrecovery/get_data_source_references.py +135 -0
- pulumi_gcp/backupdisasterrecovery/get_management_server.py +4 -0
- pulumi_gcp/backupdisasterrecovery/outputs.py +103 -0
- pulumi_gcp/beyondcorp/__init__.py +0 -5
- pulumi_gcp/beyondcorp/_inputs.py +0 -312
- pulumi_gcp/beyondcorp/outputs.py +0 -200
- pulumi_gcp/bigquery/_inputs.py +114 -4
- pulumi_gcp/bigquery/app_profile.py +3 -5
- pulumi_gcp/bigquery/outputs.py +75 -5
- pulumi_gcp/bigqueryanalyticshub/data_exchange_subscription.py +20 -0
- pulumi_gcp/bigtable/app_profile.py +1 -1
- pulumi_gcp/bigtable/get_table_iam_policy.py +16 -18
- pulumi_gcp/bigtable/table_iam_binding.py +43 -43
- pulumi_gcp/bigtable/table_iam_member.py +43 -43
- pulumi_gcp/bigtable/table_iam_policy.py +43 -43
- pulumi_gcp/billing/_inputs.py +0 -6
- pulumi_gcp/billing/outputs.py +0 -4
- pulumi_gcp/certificatemanager/__init__.py +1 -0
- pulumi_gcp/certificatemanager/certificate_map_entry.py +7 -7
- pulumi_gcp/certificatemanager/get_dns_authorization.py +229 -0
- pulumi_gcp/certificatemanager/outputs.py +41 -0
- pulumi_gcp/chronicle/_inputs.py +6 -5
- pulumi_gcp/chronicle/outputs.py +4 -3
- pulumi_gcp/chronicle/reference_list.py +53 -5
- pulumi_gcp/cloudasset/get_resources_search_all.py +8 -0
- pulumi_gcp/cloudbuild/_inputs.py +309 -45
- pulumi_gcp/cloudbuild/bitbucket_server_config.py +2 -6
- pulumi_gcp/cloudbuild/get_trigger.py +12 -1
- pulumi_gcp/cloudbuild/outputs.py +380 -30
- pulumi_gcp/cloudbuild/trigger.py +160 -2
- pulumi_gcp/cloudbuild/worker_pool.py +2 -6
- pulumi_gcp/cloudfunctionsv2/_inputs.py +23 -21
- pulumi_gcp/cloudfunctionsv2/outputs.py +17 -16
- pulumi_gcp/cloudquota/s_quota_adjuster_settings.py +16 -0
- pulumi_gcp/cloudrunv2/_inputs.py +80 -26
- pulumi_gcp/cloudrunv2/get_service.py +12 -1
- pulumi_gcp/cloudrunv2/outputs.py +109 -30
- pulumi_gcp/cloudrunv2/service.py +72 -12
- pulumi_gcp/cloudrunv2/worker_pool.py +2 -2
- pulumi_gcp/cloudtasks/queue.py +98 -2
- pulumi_gcp/colab/_inputs.py +1 -114
- pulumi_gcp/colab/outputs.py +1 -106
- pulumi_gcp/compute/_inputs.py +884 -24
- pulumi_gcp/compute/backend_bucket.py +68 -0
- pulumi_gcp/compute/backend_bucket_iam_binding.py +236 -0
- pulumi_gcp/compute/backend_bucket_iam_member.py +236 -0
- pulumi_gcp/compute/backend_bucket_iam_policy.py +236 -0
- pulumi_gcp/compute/backend_service.py +54 -0
- pulumi_gcp/compute/backend_service_iam_binding.py +464 -0
- pulumi_gcp/compute/backend_service_iam_member.py +464 -0
- pulumi_gcp/compute/backend_service_iam_policy.py +464 -0
- pulumi_gcp/compute/cross_site_network.py +16 -0
- pulumi_gcp/compute/future_reservation.py +32 -0
- pulumi_gcp/compute/get_backend_bucket.py +12 -1
- pulumi_gcp/compute/get_backend_service.py +12 -1
- pulumi_gcp/compute/get_region_backend_service.py +12 -1
- pulumi_gcp/compute/get_resource_policy.py +2 -20
- pulumi_gcp/compute/machine_image_iam_binding.py +8 -4
- pulumi_gcp/compute/machine_image_iam_member.py +8 -4
- pulumi_gcp/compute/machine_image_iam_policy.py +8 -4
- pulumi_gcp/compute/network_edge_security_service.py +16 -0
- pulumi_gcp/compute/network_firewall_policy_packet_mirroring_rule.py +12 -0
- pulumi_gcp/compute/network_peering_routes_config.py +0 -100
- pulumi_gcp/compute/organization_security_policy.py +83 -51
- pulumi_gcp/compute/outputs.py +799 -16
- pulumi_gcp/compute/packet_mirroring.py +6 -0
- pulumi_gcp/compute/preview_feature.py +16 -0
- pulumi_gcp/compute/public_delegated_prefix.py +42 -0
- pulumi_gcp/compute/region_backend_service.py +54 -0
- pulumi_gcp/compute/region_backend_service_iam_binding.py +488 -0
- pulumi_gcp/compute/region_backend_service_iam_member.py +488 -0
- pulumi_gcp/compute/region_backend_service_iam_policy.py +488 -0
- pulumi_gcp/compute/region_network_endpoint_group.py +1 -3
- pulumi_gcp/compute/region_resize_request.py +24 -0
- pulumi_gcp/compute/region_url_map.py +75 -0
- pulumi_gcp/compute/subnetwork.py +0 -98
- pulumi_gcp/compute/wire_group.py +16 -0
- pulumi_gcp/config/__init__.pyi +2 -2
- pulumi_gcp/config/vars.py +4 -4
- pulumi_gcp/container/_inputs.py +466 -18
- pulumi_gcp/container/cluster.py +16 -7
- pulumi_gcp/container/outputs.py +448 -15
- pulumi_gcp/databasemigrationservice/connection_profile.py +4 -2
- pulumi_gcp/databasemigrationservice/migration_job.py +4 -2
- pulumi_gcp/dataflow/flex_template_job.py +10 -0
- pulumi_gcp/dataform/repository.py +16 -0
- pulumi_gcp/dataform/repository_release_config.py +16 -0
- pulumi_gcp/dataform/repository_workflow_config.py +16 -0
- pulumi_gcp/diagflow/_inputs.py +152 -0
- pulumi_gcp/diagflow/cx_agent.py +425 -0
- pulumi_gcp/diagflow/outputs.py +143 -0
- pulumi_gcp/discoveryengine/__init__.py +1 -0
- pulumi_gcp/discoveryengine/_inputs.py +94 -0
- pulumi_gcp/discoveryengine/acl_config.py +393 -0
- pulumi_gcp/discoveryengine/outputs.py +92 -0
- pulumi_gcp/firebase/android_app.py +16 -0
- pulumi_gcp/firebase/app_check_play_integrity_config.py +4 -8
- pulumi_gcp/firebase/app_check_recaptcha_enterprise_config.py +2 -4
- pulumi_gcp/firebase/app_check_service_config.py +6 -12
- pulumi_gcp/firebase/app_hosting_backend.py +4 -8
- pulumi_gcp/firebase/app_hosting_build.py +4 -8
- pulumi_gcp/firebase/app_hosting_traffic.py +6 -12
- pulumi_gcp/firebase/apple_app.py +16 -0
- pulumi_gcp/firebase/data_connect_service.py +4 -8
- pulumi_gcp/firebase/database_instance.py +20 -8
- pulumi_gcp/firebase/extensions_instance.py +12 -0
- pulumi_gcp/firebase/get_android_app.py +4 -2
- pulumi_gcp/firebase/get_apple_app.py +4 -2
- pulumi_gcp/firebase/get_apple_app_config.py +16 -2
- pulumi_gcp/firebase/get_hosting_channel.py +4 -2
- pulumi_gcp/firebase/hosting_channel.py +20 -0
- pulumi_gcp/firebase/hosting_custom_domain.py +20 -0
- pulumi_gcp/firebase/hosting_release.py +16 -0
- pulumi_gcp/firebase/hosting_site.py +16 -0
- pulumi_gcp/firebase/hosting_version.py +16 -0
- pulumi_gcp/firebase/storage_bucket.py +18 -0
- pulumi_gcp/firestore/index.py +118 -3
- pulumi_gcp/folder/service_identity.py +26 -0
- pulumi_gcp/gkehub/_inputs.py +0 -60
- pulumi_gcp/gkehub/get_membership.py +1 -12
- pulumi_gcp/gkehub/membership.py +0 -70
- pulumi_gcp/gkehub/membership_rbac_role_binding.py +16 -0
- pulumi_gcp/gkehub/outputs.py +0 -36
- pulumi_gcp/healthcare/_inputs.py +205 -0
- pulumi_gcp/healthcare/fhir_store.py +128 -0
- pulumi_gcp/healthcare/outputs.py +163 -0
- pulumi_gcp/iam/workload_identity_pool_iam_binding.py +464 -0
- pulumi_gcp/iam/workload_identity_pool_iam_member.py +464 -0
- pulumi_gcp/iam/workload_identity_pool_iam_policy.py +464 -0
- pulumi_gcp/iam/workload_identity_pool_managed_identity.py +18 -0
- pulumi_gcp/iam/workload_identity_pool_namespace.py +20 -0
- pulumi_gcp/iap/__init__.py +8 -0
- pulumi_gcp/iap/_inputs.py +260 -0
- pulumi_gcp/iap/get_web_forwarding_rule_service_iam_policy.py +159 -0
- pulumi_gcp/iap/get_web_region_forwarding_rule_service_iam_policy.py +182 -0
- pulumi_gcp/iap/outputs.py +152 -0
- pulumi_gcp/{beyondcorp/application_iam_binding.py → iap/web_forwarding_rule_service_iam_binding.py} +233 -315
- pulumi_gcp/{beyondcorp/application_iam_member.py → iap/web_forwarding_rule_service_iam_member.py} +233 -315
- pulumi_gcp/{beyondcorp/application_iam_policy.py → iap/web_forwarding_rule_service_iam_policy.py} +212 -294
- pulumi_gcp/iap/web_region_forwarding_rule_service_iam_binding.py +1091 -0
- pulumi_gcp/iap/web_region_forwarding_rule_service_iam_member.py +1091 -0
- pulumi_gcp/iap/web_region_forwarding_rule_service_iam_policy.py +910 -0
- pulumi_gcp/kms/autokey_config.py +0 -2
- pulumi_gcp/kms/get_kms_secret_asymmetric.py +22 -0
- pulumi_gcp/kms/key_handle.py +0 -2
- pulumi_gcp/logging/organization_sink.py +7 -7
- pulumi_gcp/managedkafka/connect_cluster.py +4 -0
- pulumi_gcp/managedkafka/connector.py +4 -0
- pulumi_gcp/memorystore/get_instance.py +1 -12
- pulumi_gcp/memorystore/instance.py +14 -84
- pulumi_gcp/netapp/storage_pool.py +91 -2
- pulumi_gcp/netapp/volume.py +47 -0
- pulumi_gcp/networkmanagement/__init__.py +1 -0
- pulumi_gcp/networkmanagement/organization_vpc_flow_logs_config.py +1028 -0
- pulumi_gcp/networksecurity/authorization_policy.py +12 -0
- pulumi_gcp/networkservices/gateway.py +7 -7
- pulumi_gcp/networkservices/lb_traffic_extension.py +24 -23
- pulumi_gcp/networkservices/service_lb_policies.py +12 -0
- pulumi_gcp/notebooks/__init__.py +0 -1
- pulumi_gcp/oracledatabase/autonomous_database.py +2 -2
- pulumi_gcp/oracledatabase/cloud_vm_cluster.py +3 -3
- pulumi_gcp/projects/service.py +2 -11
- pulumi_gcp/provider.py +20 -20
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/redis/cluster.py +0 -70
- pulumi_gcp/redis/get_cluster.py +1 -12
- pulumi_gcp/resourcemanager/capability.py +16 -0
- pulumi_gcp/runtimeconfig/config.py +16 -0
- pulumi_gcp/runtimeconfig/config_iam_binding.py +236 -0
- pulumi_gcp/runtimeconfig/config_iam_member.py +236 -0
- pulumi_gcp/runtimeconfig/config_iam_policy.py +236 -0
- pulumi_gcp/runtimeconfig/variable.py +10 -0
- pulumi_gcp/saasruntime/__init__.py +12 -0
- pulumi_gcp/saasruntime/_inputs.py +513 -0
- pulumi_gcp/saasruntime/outputs.py +431 -0
- pulumi_gcp/saasruntime/saa_s.py +819 -0
- pulumi_gcp/saasruntime/unit_kind.py +1024 -0
- pulumi_gcp/securesourcemanager/_inputs.py +20 -19
- pulumi_gcp/securesourcemanager/instance.py +7 -7
- pulumi_gcp/securesourcemanager/outputs.py +15 -14
- pulumi_gcp/securesourcemanager/repository.py +7 -7
- pulumi_gcp/serviceaccount/get_account_key.py +1 -21
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +4 -4
- pulumi_gcp/servicedirectory/namespace_iam_member.py +4 -4
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +4 -4
- pulumi_gcp/servicedirectory/service_iam_binding.py +4 -4
- pulumi_gcp/servicedirectory/service_iam_member.py +4 -4
- pulumi_gcp/servicedirectory/service_iam_policy.py +4 -4
- pulumi_gcp/sql/_inputs.py +135 -1
- pulumi_gcp/sql/database_instance.py +94 -0
- pulumi_gcp/sql/get_database_instance.py +23 -1
- pulumi_gcp/sql/outputs.py +276 -3
- pulumi_gcp/sql/user.py +61 -0
- pulumi_gcp/storage/_inputs.py +253 -7
- pulumi_gcp/storage/bucket_object.py +0 -9
- pulumi_gcp/storage/outputs.py +198 -8
- pulumi_gcp/storage/transfer_job.py +47 -0
- pulumi_gcp/tpu/__init__.py +0 -2
- pulumi_gcp/tpu/_inputs.py +0 -93
- pulumi_gcp/tpu/outputs.py +0 -72
- pulumi_gcp/tpu/v2_queued_resource.py +16 -0
- pulumi_gcp/tpu/v2_vm.py +16 -0
- pulumi_gcp/vertex/_inputs.py +8 -9
- pulumi_gcp/vertex/ai_endpoint.py +2 -4
- pulumi_gcp/vertex/ai_feature_group_iam_binding.py +236 -0
- pulumi_gcp/vertex/ai_feature_group_iam_member.py +236 -0
- pulumi_gcp/vertex/ai_feature_group_iam_policy.py +236 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview.py +0 -2
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_binding.py +248 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_member.py +248 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_policy.py +248 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_binding.py +236 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_member.py +236 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_policy.py +236 -0
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_binding.py +238 -0
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_member.py +238 -0
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_policy.py +238 -0
- pulumi_gcp/vertex/ai_feature_store_iam_binding.py +248 -0
- pulumi_gcp/vertex/ai_feature_store_iam_member.py +248 -0
- pulumi_gcp/vertex/ai_feature_store_iam_policy.py +248 -0
- pulumi_gcp/vertex/ai_index.py +24 -23
- pulumi_gcp/vertex/ai_metadata_store.py +16 -0
- pulumi_gcp/vertex/outputs.py +7 -8
- pulumi_gcp/workstations/workstation.py +16 -0
- pulumi_gcp/workstations/workstation_cluster.py +16 -0
- pulumi_gcp/workstations/workstation_config.py +16 -0
- pulumi_gcp/workstations/workstation_config_iam_binding.py +260 -0
- pulumi_gcp/workstations/workstation_config_iam_member.py +260 -0
- pulumi_gcp/workstations/workstation_config_iam_policy.py +260 -0
- pulumi_gcp/workstations/workstation_iam_binding.py +272 -0
- pulumi_gcp/workstations/workstation_iam_member.py +272 -0
- pulumi_gcp/workstations/workstation_iam_policy.py +272 -0
- {pulumi_gcp-8.42.0a1758178363.dist-info → pulumi_gcp-9.0.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-8.42.0a1758178363.dist-info → pulumi_gcp-9.0.0.dist-info}/RECORD +266 -255
- pulumi_gcp/beyondcorp/application.py +0 -746
- pulumi_gcp/beyondcorp/get_application_iam_policy.py +0 -182
- pulumi_gcp/notebooks/location.py +0 -285
- pulumi_gcp/tpu/get_tensorflow_versions.py +0 -184
- pulumi_gcp/tpu/node.py +0 -1062
- {pulumi_gcp-8.42.0a1758178363.dist-info → pulumi_gcp-9.0.0.dist-info}/WHEEL +0 -0
- {pulumi_gcp-8.42.0a1758178363.dist-info → pulumi_gcp-9.0.0.dist-info}/top_level.txt +0 -0
@@ -211,6 +211,250 @@ class RegionBackendServiceIamPolicy(pulumi.CustomResource):
|
|
211
211
|
region: Optional[pulumi.Input[_builtins.str]] = None,
|
212
212
|
__props__=None):
|
213
213
|
"""
|
214
|
+
Three different resources help you manage your IAM policy for Compute Engine RegionBackendService. Each of these resources serves a different use case:
|
215
|
+
|
216
|
+
* `compute.RegionBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the regionbackendservice and replaces any existing policy already attached.
|
217
|
+
* `compute.RegionBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regionbackendservice are preserved.
|
218
|
+
* `compute.RegionBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regionbackendservice are preserved.
|
219
|
+
|
220
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
221
|
+
|
222
|
+
* `compute.RegionBackendServiceIamPolicy`: Retrieves the IAM policy for the regionbackendservice
|
223
|
+
|
224
|
+
> **Note:** `compute.RegionBackendServiceIamPolicy` **cannot** be used in conjunction with `compute.RegionBackendServiceIamBinding` and `compute.RegionBackendServiceIamMember` or they will fight over what your policy should be.
|
225
|
+
|
226
|
+
> **Note:** `compute.RegionBackendServiceIamBinding` resources **can be** used in conjunction with `compute.RegionBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
227
|
+
|
228
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
229
|
+
|
230
|
+
## compute.RegionBackendServiceIamPolicy
|
231
|
+
|
232
|
+
```python
|
233
|
+
import pulumi
|
234
|
+
import pulumi_gcp as gcp
|
235
|
+
|
236
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
237
|
+
"role": "roles/compute.admin",
|
238
|
+
"members": ["user:jane@example.com"],
|
239
|
+
}])
|
240
|
+
policy = gcp.compute.RegionBackendServiceIamPolicy("policy",
|
241
|
+
project=default["project"],
|
242
|
+
region=default["region"],
|
243
|
+
name=default["name"],
|
244
|
+
policy_data=admin.policy_data)
|
245
|
+
```
|
246
|
+
|
247
|
+
With IAM Conditions:
|
248
|
+
|
249
|
+
```python
|
250
|
+
import pulumi
|
251
|
+
import pulumi_gcp as gcp
|
252
|
+
|
253
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
254
|
+
"role": "roles/compute.admin",
|
255
|
+
"members": ["user:jane@example.com"],
|
256
|
+
"condition": {
|
257
|
+
"title": "expires_after_2019_12_31",
|
258
|
+
"description": "Expiring at midnight of 2019-12-31",
|
259
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
260
|
+
},
|
261
|
+
}])
|
262
|
+
policy = gcp.compute.RegionBackendServiceIamPolicy("policy",
|
263
|
+
project=default["project"],
|
264
|
+
region=default["region"],
|
265
|
+
name=default["name"],
|
266
|
+
policy_data=admin.policy_data)
|
267
|
+
```
|
268
|
+
## compute.RegionBackendServiceIamBinding
|
269
|
+
|
270
|
+
```python
|
271
|
+
import pulumi
|
272
|
+
import pulumi_gcp as gcp
|
273
|
+
|
274
|
+
binding = gcp.compute.RegionBackendServiceIamBinding("binding",
|
275
|
+
project=default["project"],
|
276
|
+
region=default["region"],
|
277
|
+
name=default["name"],
|
278
|
+
role="roles/compute.admin",
|
279
|
+
members=["user:jane@example.com"])
|
280
|
+
```
|
281
|
+
|
282
|
+
With IAM Conditions:
|
283
|
+
|
284
|
+
```python
|
285
|
+
import pulumi
|
286
|
+
import pulumi_gcp as gcp
|
287
|
+
|
288
|
+
binding = gcp.compute.RegionBackendServiceIamBinding("binding",
|
289
|
+
project=default["project"],
|
290
|
+
region=default["region"],
|
291
|
+
name=default["name"],
|
292
|
+
role="roles/compute.admin",
|
293
|
+
members=["user:jane@example.com"],
|
294
|
+
condition={
|
295
|
+
"title": "expires_after_2019_12_31",
|
296
|
+
"description": "Expiring at midnight of 2019-12-31",
|
297
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
298
|
+
})
|
299
|
+
```
|
300
|
+
## compute.RegionBackendServiceIamMember
|
301
|
+
|
302
|
+
```python
|
303
|
+
import pulumi
|
304
|
+
import pulumi_gcp as gcp
|
305
|
+
|
306
|
+
member = gcp.compute.RegionBackendServiceIamMember("member",
|
307
|
+
project=default["project"],
|
308
|
+
region=default["region"],
|
309
|
+
name=default["name"],
|
310
|
+
role="roles/compute.admin",
|
311
|
+
member="user:jane@example.com")
|
312
|
+
```
|
313
|
+
|
314
|
+
With IAM Conditions:
|
315
|
+
|
316
|
+
```python
|
317
|
+
import pulumi
|
318
|
+
import pulumi_gcp as gcp
|
319
|
+
|
320
|
+
member = gcp.compute.RegionBackendServiceIamMember("member",
|
321
|
+
project=default["project"],
|
322
|
+
region=default["region"],
|
323
|
+
name=default["name"],
|
324
|
+
role="roles/compute.admin",
|
325
|
+
member="user:jane@example.com",
|
326
|
+
condition={
|
327
|
+
"title": "expires_after_2019_12_31",
|
328
|
+
"description": "Expiring at midnight of 2019-12-31",
|
329
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
330
|
+
})
|
331
|
+
```
|
332
|
+
|
333
|
+
## This resource supports User Project Overrides.
|
334
|
+
|
335
|
+
-
|
336
|
+
|
337
|
+
# IAM policy for Compute Engine RegionBackendService
|
338
|
+
|
339
|
+
Three different resources help you manage your IAM policy for Compute Engine RegionBackendService. Each of these resources serves a different use case:
|
340
|
+
|
341
|
+
* `compute.RegionBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the regionbackendservice and replaces any existing policy already attached.
|
342
|
+
* `compute.RegionBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regionbackendservice are preserved.
|
343
|
+
* `compute.RegionBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regionbackendservice are preserved.
|
344
|
+
|
345
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
346
|
+
|
347
|
+
* `compute.RegionBackendServiceIamPolicy`: Retrieves the IAM policy for the regionbackendservice
|
348
|
+
|
349
|
+
> **Note:** `compute.RegionBackendServiceIamPolicy` **cannot** be used in conjunction with `compute.RegionBackendServiceIamBinding` and `compute.RegionBackendServiceIamMember` or they will fight over what your policy should be.
|
350
|
+
|
351
|
+
> **Note:** `compute.RegionBackendServiceIamBinding` resources **can be** used in conjunction with `compute.RegionBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
352
|
+
|
353
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
354
|
+
|
355
|
+
## compute.RegionBackendServiceIamPolicy
|
356
|
+
|
357
|
+
```python
|
358
|
+
import pulumi
|
359
|
+
import pulumi_gcp as gcp
|
360
|
+
|
361
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
362
|
+
"role": "roles/compute.admin",
|
363
|
+
"members": ["user:jane@example.com"],
|
364
|
+
}])
|
365
|
+
policy = gcp.compute.RegionBackendServiceIamPolicy("policy",
|
366
|
+
project=default["project"],
|
367
|
+
region=default["region"],
|
368
|
+
name=default["name"],
|
369
|
+
policy_data=admin.policy_data)
|
370
|
+
```
|
371
|
+
|
372
|
+
With IAM Conditions:
|
373
|
+
|
374
|
+
```python
|
375
|
+
import pulumi
|
376
|
+
import pulumi_gcp as gcp
|
377
|
+
|
378
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
379
|
+
"role": "roles/compute.admin",
|
380
|
+
"members": ["user:jane@example.com"],
|
381
|
+
"condition": {
|
382
|
+
"title": "expires_after_2019_12_31",
|
383
|
+
"description": "Expiring at midnight of 2019-12-31",
|
384
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
385
|
+
},
|
386
|
+
}])
|
387
|
+
policy = gcp.compute.RegionBackendServiceIamPolicy("policy",
|
388
|
+
project=default["project"],
|
389
|
+
region=default["region"],
|
390
|
+
name=default["name"],
|
391
|
+
policy_data=admin.policy_data)
|
392
|
+
```
|
393
|
+
## compute.RegionBackendServiceIamBinding
|
394
|
+
|
395
|
+
```python
|
396
|
+
import pulumi
|
397
|
+
import pulumi_gcp as gcp
|
398
|
+
|
399
|
+
binding = gcp.compute.RegionBackendServiceIamBinding("binding",
|
400
|
+
project=default["project"],
|
401
|
+
region=default["region"],
|
402
|
+
name=default["name"],
|
403
|
+
role="roles/compute.admin",
|
404
|
+
members=["user:jane@example.com"])
|
405
|
+
```
|
406
|
+
|
407
|
+
With IAM Conditions:
|
408
|
+
|
409
|
+
```python
|
410
|
+
import pulumi
|
411
|
+
import pulumi_gcp as gcp
|
412
|
+
|
413
|
+
binding = gcp.compute.RegionBackendServiceIamBinding("binding",
|
414
|
+
project=default["project"],
|
415
|
+
region=default["region"],
|
416
|
+
name=default["name"],
|
417
|
+
role="roles/compute.admin",
|
418
|
+
members=["user:jane@example.com"],
|
419
|
+
condition={
|
420
|
+
"title": "expires_after_2019_12_31",
|
421
|
+
"description": "Expiring at midnight of 2019-12-31",
|
422
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
423
|
+
})
|
424
|
+
```
|
425
|
+
## compute.RegionBackendServiceIamMember
|
426
|
+
|
427
|
+
```python
|
428
|
+
import pulumi
|
429
|
+
import pulumi_gcp as gcp
|
430
|
+
|
431
|
+
member = gcp.compute.RegionBackendServiceIamMember("member",
|
432
|
+
project=default["project"],
|
433
|
+
region=default["region"],
|
434
|
+
name=default["name"],
|
435
|
+
role="roles/compute.admin",
|
436
|
+
member="user:jane@example.com")
|
437
|
+
```
|
438
|
+
|
439
|
+
With IAM Conditions:
|
440
|
+
|
441
|
+
```python
|
442
|
+
import pulumi
|
443
|
+
import pulumi_gcp as gcp
|
444
|
+
|
445
|
+
member = gcp.compute.RegionBackendServiceIamMember("member",
|
446
|
+
project=default["project"],
|
447
|
+
region=default["region"],
|
448
|
+
name=default["name"],
|
449
|
+
role="roles/compute.admin",
|
450
|
+
member="user:jane@example.com",
|
451
|
+
condition={
|
452
|
+
"title": "expires_after_2019_12_31",
|
453
|
+
"description": "Expiring at midnight of 2019-12-31",
|
454
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
455
|
+
})
|
456
|
+
```
|
457
|
+
|
214
458
|
## Import
|
215
459
|
|
216
460
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
@@ -269,6 +513,250 @@ class RegionBackendServiceIamPolicy(pulumi.CustomResource):
|
|
269
513
|
args: RegionBackendServiceIamPolicyArgs,
|
270
514
|
opts: Optional[pulumi.ResourceOptions] = None):
|
271
515
|
"""
|
516
|
+
Three different resources help you manage your IAM policy for Compute Engine RegionBackendService. Each of these resources serves a different use case:
|
517
|
+
|
518
|
+
* `compute.RegionBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the regionbackendservice and replaces any existing policy already attached.
|
519
|
+
* `compute.RegionBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regionbackendservice are preserved.
|
520
|
+
* `compute.RegionBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regionbackendservice are preserved.
|
521
|
+
|
522
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
523
|
+
|
524
|
+
* `compute.RegionBackendServiceIamPolicy`: Retrieves the IAM policy for the regionbackendservice
|
525
|
+
|
526
|
+
> **Note:** `compute.RegionBackendServiceIamPolicy` **cannot** be used in conjunction with `compute.RegionBackendServiceIamBinding` and `compute.RegionBackendServiceIamMember` or they will fight over what your policy should be.
|
527
|
+
|
528
|
+
> **Note:** `compute.RegionBackendServiceIamBinding` resources **can be** used in conjunction with `compute.RegionBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
529
|
+
|
530
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
531
|
+
|
532
|
+
## compute.RegionBackendServiceIamPolicy
|
533
|
+
|
534
|
+
```python
|
535
|
+
import pulumi
|
536
|
+
import pulumi_gcp as gcp
|
537
|
+
|
538
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
539
|
+
"role": "roles/compute.admin",
|
540
|
+
"members": ["user:jane@example.com"],
|
541
|
+
}])
|
542
|
+
policy = gcp.compute.RegionBackendServiceIamPolicy("policy",
|
543
|
+
project=default["project"],
|
544
|
+
region=default["region"],
|
545
|
+
name=default["name"],
|
546
|
+
policy_data=admin.policy_data)
|
547
|
+
```
|
548
|
+
|
549
|
+
With IAM Conditions:
|
550
|
+
|
551
|
+
```python
|
552
|
+
import pulumi
|
553
|
+
import pulumi_gcp as gcp
|
554
|
+
|
555
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
556
|
+
"role": "roles/compute.admin",
|
557
|
+
"members": ["user:jane@example.com"],
|
558
|
+
"condition": {
|
559
|
+
"title": "expires_after_2019_12_31",
|
560
|
+
"description": "Expiring at midnight of 2019-12-31",
|
561
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
562
|
+
},
|
563
|
+
}])
|
564
|
+
policy = gcp.compute.RegionBackendServiceIamPolicy("policy",
|
565
|
+
project=default["project"],
|
566
|
+
region=default["region"],
|
567
|
+
name=default["name"],
|
568
|
+
policy_data=admin.policy_data)
|
569
|
+
```
|
570
|
+
## compute.RegionBackendServiceIamBinding
|
571
|
+
|
572
|
+
```python
|
573
|
+
import pulumi
|
574
|
+
import pulumi_gcp as gcp
|
575
|
+
|
576
|
+
binding = gcp.compute.RegionBackendServiceIamBinding("binding",
|
577
|
+
project=default["project"],
|
578
|
+
region=default["region"],
|
579
|
+
name=default["name"],
|
580
|
+
role="roles/compute.admin",
|
581
|
+
members=["user:jane@example.com"])
|
582
|
+
```
|
583
|
+
|
584
|
+
With IAM Conditions:
|
585
|
+
|
586
|
+
```python
|
587
|
+
import pulumi
|
588
|
+
import pulumi_gcp as gcp
|
589
|
+
|
590
|
+
binding = gcp.compute.RegionBackendServiceIamBinding("binding",
|
591
|
+
project=default["project"],
|
592
|
+
region=default["region"],
|
593
|
+
name=default["name"],
|
594
|
+
role="roles/compute.admin",
|
595
|
+
members=["user:jane@example.com"],
|
596
|
+
condition={
|
597
|
+
"title": "expires_after_2019_12_31",
|
598
|
+
"description": "Expiring at midnight of 2019-12-31",
|
599
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
600
|
+
})
|
601
|
+
```
|
602
|
+
## compute.RegionBackendServiceIamMember
|
603
|
+
|
604
|
+
```python
|
605
|
+
import pulumi
|
606
|
+
import pulumi_gcp as gcp
|
607
|
+
|
608
|
+
member = gcp.compute.RegionBackendServiceIamMember("member",
|
609
|
+
project=default["project"],
|
610
|
+
region=default["region"],
|
611
|
+
name=default["name"],
|
612
|
+
role="roles/compute.admin",
|
613
|
+
member="user:jane@example.com")
|
614
|
+
```
|
615
|
+
|
616
|
+
With IAM Conditions:
|
617
|
+
|
618
|
+
```python
|
619
|
+
import pulumi
|
620
|
+
import pulumi_gcp as gcp
|
621
|
+
|
622
|
+
member = gcp.compute.RegionBackendServiceIamMember("member",
|
623
|
+
project=default["project"],
|
624
|
+
region=default["region"],
|
625
|
+
name=default["name"],
|
626
|
+
role="roles/compute.admin",
|
627
|
+
member="user:jane@example.com",
|
628
|
+
condition={
|
629
|
+
"title": "expires_after_2019_12_31",
|
630
|
+
"description": "Expiring at midnight of 2019-12-31",
|
631
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
632
|
+
})
|
633
|
+
```
|
634
|
+
|
635
|
+
## This resource supports User Project Overrides.
|
636
|
+
|
637
|
+
-
|
638
|
+
|
639
|
+
# IAM policy for Compute Engine RegionBackendService
|
640
|
+
|
641
|
+
Three different resources help you manage your IAM policy for Compute Engine RegionBackendService. Each of these resources serves a different use case:
|
642
|
+
|
643
|
+
* `compute.RegionBackendServiceIamPolicy`: Authoritative. Sets the IAM policy for the regionbackendservice and replaces any existing policy already attached.
|
644
|
+
* `compute.RegionBackendServiceIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the regionbackendservice are preserved.
|
645
|
+
* `compute.RegionBackendServiceIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the regionbackendservice are preserved.
|
646
|
+
|
647
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
648
|
+
|
649
|
+
* `compute.RegionBackendServiceIamPolicy`: Retrieves the IAM policy for the regionbackendservice
|
650
|
+
|
651
|
+
> **Note:** `compute.RegionBackendServiceIamPolicy` **cannot** be used in conjunction with `compute.RegionBackendServiceIamBinding` and `compute.RegionBackendServiceIamMember` or they will fight over what your policy should be.
|
652
|
+
|
653
|
+
> **Note:** `compute.RegionBackendServiceIamBinding` resources **can be** used in conjunction with `compute.RegionBackendServiceIamMember` resources **only if** they do not grant privilege to the same role.
|
654
|
+
|
655
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
656
|
+
|
657
|
+
## compute.RegionBackendServiceIamPolicy
|
658
|
+
|
659
|
+
```python
|
660
|
+
import pulumi
|
661
|
+
import pulumi_gcp as gcp
|
662
|
+
|
663
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
664
|
+
"role": "roles/compute.admin",
|
665
|
+
"members": ["user:jane@example.com"],
|
666
|
+
}])
|
667
|
+
policy = gcp.compute.RegionBackendServiceIamPolicy("policy",
|
668
|
+
project=default["project"],
|
669
|
+
region=default["region"],
|
670
|
+
name=default["name"],
|
671
|
+
policy_data=admin.policy_data)
|
672
|
+
```
|
673
|
+
|
674
|
+
With IAM Conditions:
|
675
|
+
|
676
|
+
```python
|
677
|
+
import pulumi
|
678
|
+
import pulumi_gcp as gcp
|
679
|
+
|
680
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
681
|
+
"role": "roles/compute.admin",
|
682
|
+
"members": ["user:jane@example.com"],
|
683
|
+
"condition": {
|
684
|
+
"title": "expires_after_2019_12_31",
|
685
|
+
"description": "Expiring at midnight of 2019-12-31",
|
686
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
687
|
+
},
|
688
|
+
}])
|
689
|
+
policy = gcp.compute.RegionBackendServiceIamPolicy("policy",
|
690
|
+
project=default["project"],
|
691
|
+
region=default["region"],
|
692
|
+
name=default["name"],
|
693
|
+
policy_data=admin.policy_data)
|
694
|
+
```
|
695
|
+
## compute.RegionBackendServiceIamBinding
|
696
|
+
|
697
|
+
```python
|
698
|
+
import pulumi
|
699
|
+
import pulumi_gcp as gcp
|
700
|
+
|
701
|
+
binding = gcp.compute.RegionBackendServiceIamBinding("binding",
|
702
|
+
project=default["project"],
|
703
|
+
region=default["region"],
|
704
|
+
name=default["name"],
|
705
|
+
role="roles/compute.admin",
|
706
|
+
members=["user:jane@example.com"])
|
707
|
+
```
|
708
|
+
|
709
|
+
With IAM Conditions:
|
710
|
+
|
711
|
+
```python
|
712
|
+
import pulumi
|
713
|
+
import pulumi_gcp as gcp
|
714
|
+
|
715
|
+
binding = gcp.compute.RegionBackendServiceIamBinding("binding",
|
716
|
+
project=default["project"],
|
717
|
+
region=default["region"],
|
718
|
+
name=default["name"],
|
719
|
+
role="roles/compute.admin",
|
720
|
+
members=["user:jane@example.com"],
|
721
|
+
condition={
|
722
|
+
"title": "expires_after_2019_12_31",
|
723
|
+
"description": "Expiring at midnight of 2019-12-31",
|
724
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
725
|
+
})
|
726
|
+
```
|
727
|
+
## compute.RegionBackendServiceIamMember
|
728
|
+
|
729
|
+
```python
|
730
|
+
import pulumi
|
731
|
+
import pulumi_gcp as gcp
|
732
|
+
|
733
|
+
member = gcp.compute.RegionBackendServiceIamMember("member",
|
734
|
+
project=default["project"],
|
735
|
+
region=default["region"],
|
736
|
+
name=default["name"],
|
737
|
+
role="roles/compute.admin",
|
738
|
+
member="user:jane@example.com")
|
739
|
+
```
|
740
|
+
|
741
|
+
With IAM Conditions:
|
742
|
+
|
743
|
+
```python
|
744
|
+
import pulumi
|
745
|
+
import pulumi_gcp as gcp
|
746
|
+
|
747
|
+
member = gcp.compute.RegionBackendServiceIamMember("member",
|
748
|
+
project=default["project"],
|
749
|
+
region=default["region"],
|
750
|
+
name=default["name"],
|
751
|
+
role="roles/compute.admin",
|
752
|
+
member="user:jane@example.com",
|
753
|
+
condition={
|
754
|
+
"title": "expires_after_2019_12_31",
|
755
|
+
"description": "Expiring at midnight of 2019-12-31",
|
756
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
757
|
+
})
|
758
|
+
```
|
759
|
+
|
272
760
|
## Import
|
273
761
|
|
274
762
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
@@ -807,7 +807,6 @@ class RegionNetworkEndpointGroup(pulumi.CustomResource):
|
|
807
807
|
psc_data={
|
808
808
|
"producer_port": "88",
|
809
809
|
},
|
810
|
-
network=default.self_link,
|
811
810
|
subnetwork=default_subnetwork.self_link)
|
812
811
|
```
|
813
812
|
### Region Network Endpoint Group Internet Ip Port
|
@@ -1158,7 +1157,6 @@ class RegionNetworkEndpointGroup(pulumi.CustomResource):
|
|
1158
1157
|
psc_data={
|
1159
1158
|
"producer_port": "88",
|
1160
1159
|
},
|
1161
|
-
network=default.self_link,
|
1162
1160
|
subnetwork=default_subnetwork.self_link)
|
1163
1161
|
```
|
1164
1162
|
### Region Network Endpoint Group Internet Ip Port
|
@@ -1435,7 +1433,7 @@ class RegionNetworkEndpointGroup(pulumi.CustomResource):
|
|
1435
1433
|
|
1436
1434
|
@_builtins.property
|
1437
1435
|
@pulumi.getter
|
1438
|
-
def network(self) -> pulumi.Output[
|
1436
|
+
def network(self) -> pulumi.Output[_builtins.str]:
|
1439
1437
|
"""
|
1440
1438
|
This field is only used for PSC and INTERNET NEGs.
|
1441
1439
|
The URL of the network to which all network endpoints in the NEG belong. Uses
|
@@ -329,6 +329,18 @@ class RegionResizeRequest(pulumi.CustomResource):
|
|
329
329
|
resize_by: Optional[pulumi.Input[_builtins.int]] = None,
|
330
330
|
__props__=None):
|
331
331
|
"""
|
332
|
+
Represents a Regional Managed Instance Group Resize Request
|
333
|
+
|
334
|
+
Resize Requests are the Managed Instance Group implementation of Dynamic Workload Scheduler Flex Start.
|
335
|
+
|
336
|
+
With Dynamic Workload Scheduler in Flex Start mode, you submit a GPU capacity request for your AI/ML jobs by indicating how many you need, a duration, and your preferred region. Dynamic Workload Scheduler intelligently persists the request; once the capacity becomes available, it automatically provisions your VMs enabling your workloads to run continuously for the entire duration of the capacity allocation.
|
337
|
+
|
338
|
+
To get more information about RegionResizeRequest, see:
|
339
|
+
|
340
|
+
* [API documentation](https://cloud.google.com/compute/docs/reference/rest/beta/regionInstanceGroupManagerResizeRequests)
|
341
|
+
* How-to Guides
|
342
|
+
* [About resize requests in a MIG](https://cloud.google.com/compute/docs/instance-groups/about-resize-requests-mig)
|
343
|
+
|
332
344
|
## Example Usage
|
333
345
|
|
334
346
|
### Compute Rmig Resize Request
|
@@ -456,6 +468,18 @@ class RegionResizeRequest(pulumi.CustomResource):
|
|
456
468
|
args: RegionResizeRequestArgs,
|
457
469
|
opts: Optional[pulumi.ResourceOptions] = None):
|
458
470
|
"""
|
471
|
+
Represents a Regional Managed Instance Group Resize Request
|
472
|
+
|
473
|
+
Resize Requests are the Managed Instance Group implementation of Dynamic Workload Scheduler Flex Start.
|
474
|
+
|
475
|
+
With Dynamic Workload Scheduler in Flex Start mode, you submit a GPU capacity request for your AI/ML jobs by indicating how many you need, a duration, and your preferred region. Dynamic Workload Scheduler intelligently persists the request; once the capacity becomes available, it automatically provisions your VMs enabling your workloads to run continuously for the entire duration of the capacity allocation.
|
476
|
+
|
477
|
+
To get more information about RegionResizeRequest, see:
|
478
|
+
|
479
|
+
* [API documentation](https://cloud.google.com/compute/docs/reference/rest/beta/regionInstanceGroupManagerResizeRequests)
|
480
|
+
* How-to Guides
|
481
|
+
* [About resize requests in a MIG](https://cloud.google.com/compute/docs/instance-groups/about-resize-requests-mig)
|
482
|
+
|
459
483
|
## Example Usage
|
460
484
|
|
461
485
|
### Compute Rmig Resize Request
|