- NAME
-
- gcloud model-armor floorsettings update - update a Model Armor floor setting
- SYNOPSIS
-
-
gcloud model-armor floorsettings update--full-uri=FULL_URI[--enable-floor-setting-enforcement=ENABLE_FLOOR_SETTING_ENFORCEMENT] [--[no-]enable-multi-language-detection] [--malicious-uri-filter-settings-enforcement=MALICIOUS_URI_FILTER_SETTINGS_ENFORCEMENT] [--add-google-mcp-server-apis=[API,…] |--clear-google-mcp-server-apis|--google-mcp-server-apis=[API,…] |--remove-google-mcp-server-apis=[API,…]] [--add-integrated-services=[INTEGRATED_SERVICE,…] |--clear-integrated-services|--remove-integrated-services=[INTEGRATED_SERVICE,…]] [--add-rai-settings-filters=confidenceLevel=CONFIDENCELEVEL],[filterType=FILTERTYPE] |--clear-rai-settings-filters|--rai-settings-filters=confidenceLevel=CONFIDENCELEVEL],[filterType=FILTERTYPE] |--remove-rai-settings-filters=confidenceLevel=CONFIDENCELEVEL],[filterType=FILTERTYPE]] [--advanced-config-deidentify-template=ADVANCED_CONFIG_DEIDENTIFY_TEMPLATE--advanced-config-inspect-template=ADVANCED_CONFIG_INSPECT_TEMPLATE--basic-config-filter-enforcement=BASIC_CONFIG_FILTER_ENFORCEMENT] [--[no-]enable-google-mcp-server-cloud-logging--google-mcp-server-enforcement-type=GOOGLE_MCP_SERVER_ENFORCEMENT_TYPE] [--[no-]enable-vertex-ai-cloud-logging--vertex-ai-enforcement-type=VERTEX_AI_ENFORCEMENT_TYPE] [--pi-and-jailbreak-filter-settings-confidence-level=PI_AND_JAILBREAK_FILTER_SETTINGS_CONFIDENCE_LEVEL--pi-and-jailbreak-filter-settings-enforcement=PI_AND_JAILBREAK_FILTER_SETTINGS_ENFORCEMENT] [GCLOUD_WIDE_FLAG …]
-
- DESCRIPTION
- Updates the Model Armor floor setting with the given name.
- REQUIRED FLAGS
-
--full-uri=FULL_URI- Full uri of the floor setting
- OPTIONAL FLAGS
-
--enable-floor-setting-enforcement=ENABLE_FLOOR_SETTING_ENFORCEMENT- Enable or disable the floor setting enforcement. Set the value to "TRUE" to enable the floor setting enforcement, "FALSE" to disable it.
- Multi language detection enablement.
--[no-]enable-multi-language-detection-
Enable multi-language detection for floor setting, allowing Model Armor to
process content in multiple languages. Use
--enable-multi-language-detectionto enable and--no-enable-multi-language-detectionto disable. - Malicious uri filter settings.
--malicious-uri-filter-settings-enforcement=MALICIOUS_URI_FILTER_SETTINGS_ENFORCEMENT- Malicious URI filter settings.
-
Manage list of MCP servers for which the Google MCP server floor setting is
applicable. Empty list indicates that the floor setting is applicable to all
Google MCP servers. APIs need to be valid MCP resources, for
example:
"bigquery.googleapis.com/mcp","run.googleapis.com/mcp"At most one of these can be specified:
--add-google-mcp-server-apis=[API,…]- Appends the given APIs to the list of Google MCP server APIs.
--clear-google-mcp-server-apis- Removes all APIs from the list of Google MCP server APIs. Empty list indicates that the floor setting is applicable to all Google MCP servers.
--google-mcp-server-apis=[API,…]- Replaces the current list of Google MCP server APIs with the provided list.
--remove-google-mcp-server-apis=[API,…]- Removes the given APIs from the list of Google MCP server APIs.
-
Manage integrated services to apply Model Armor floor settings. Integrated
services will have Model Armor sanitization enabled project-wide.
At most one of these can be specified:
--add-integrated-services=[INTEGRATED_SERVICE,…]- Set the list of integrated services for the floor setting. This can be used to enable project-wide Model Armor sanitization for the respective services. This flag can be repeated to specify multiple services, or a comma-separated list can be provided.
--clear-integrated-services- Clear all integrated services from the floor setting.
--remove-integrated-services=[INTEGRATED_SERVICE,…]- Remove specified service(s) from the list of integrated services. This flag can be repeated to specify multiple services, or a comma-separated list can be provided.
-
RAI filter settings.
At most one of these can be specified:
--add-rai-settings-filters=confidenceLevel=CONFIDENCELEVEL],[filterType=FILTERTYPE]-
Add rai filter settings. Sets
add_rai_settings_filtersvalue.Shorthand Example:--add-rai-settings-filters=string,stringJSON Example:--add-rai-settings-filters=["string"]
File Example:--add-rai-settings-filters=path_to_file.(yaml|json)
--clear-rai-settings-filters- Clear all rai filter settings.
--rai-settings-filters=confidenceLevel=CONFIDENCELEVEL],[filterType=FILTERTYPE]-
Set rai_settings_filters to new value. List of Responsible AI filters enabled
for floor setting. Sets
rai_settings_filtersvalue.Shorthand Example:--rai-settings-filters=string,stringJSON Example:--rai-settings-filters=["string"]
File Example:--rai-settings-filters=path_to_file.(yaml|json)
--remove-rai-settings-filters=confidenceLevel=CONFIDENCELEVEL],[filterType=FILTERTYPE]-
Remove rai filter settings. Sets
remove_rai_settings_filtersvalue.Shorthand Example:--remove-rai-settings-filters=string,stringJSON Example:--remove-rai-settings-filters=["string"]
File Example:--remove-rai-settings-filters=path_to_file.(yaml|json)
- SDP filter settings.
--advanced-config-deidentify-template=ADVANCED_CONFIG_DEIDENTIFY_TEMPLATE-
The sdp filter settings enforcement. The value has to be a valid template name.
e.g.
projects/{project}/locations/{location}/deidentifyTemplates/{deidentify_template} --advanced-config-inspect-template=ADVANCED_CONFIG_INSPECT_TEMPLATE-
The sdp filter settings enforcement. The value has to be a valid template name.
e.g.
projects/{project}/locations/{location}/inspectTemplates/{inspect_template} --basic-config-filter-enforcement=BASIC_CONFIG_FILTER_ENFORCEMENT-
The sdp filter settings enforcement. The value can be either
ENABLEDorDISABLED. - Options for Google MCP server sanitization.
--[no-]enable-google-mcp-server-cloud-logging-
Enable Cloud Logging for Google MCP server sanitization to log Model Armor
sanitization results. Use
--enable-google-mcp-server-cloud-loggingto enable and--no-enable-google-mcp-server-cloud-loggingto disable. --google-mcp-server-enforcement-type=GOOGLE_MCP_SERVER_ENFORCEMENT_TYPE- Specifies the enforcement mode for Google MCP server sanitization, such as "INSPECT_ONLY" or "INSPECT_AND_BLOCK". Default is "INSPECT_ONLY".
- Options for Vertex AI sanitization.
--[no-]enable-vertex-ai-cloud-logging-
Enable Cloud Logging for Vertex AI sanitization to log Model Armor sanitization
results. Use
--enable-vertex-ai-cloud-loggingto enable and--no-enable-vertex-ai-cloud-loggingto disable. --vertex-ai-enforcement-type=VERTEX_AI_ENFORCEMENT_TYPE- Specifies the enforcement mode for Vertex AI sanitization, such as "INSPECT_ONLY" or "INSPECT_AND_BLOCK". Default is "INSPECT_ONLY".
- PI and jailbreak filter settings.
--pi-and-jailbreak-filter-settings-confidence-level=PI_AND_JAILBREAK_FILTER_SETTINGS_CONFIDENCE_LEVEL- The pi and jailbreak filter settings confidence level. The value can be either "high", "medium-and-above" or "low-and-above"
--pi-and-jailbreak-filter-settings-enforcement=PI_AND_JAILBREAK_FILTER_SETTINGS_ENFORCEMENT- The pi and jailbreak filter settings enforcement. The value can be either "enable" or "disable".
- GCLOUD WIDE FLAGS
-
These flags are available to all commands:
--access-token-file,--account,--billing-project,--configuration,--flags-file,--flatten,--format,--help,--impersonate-service-account,--log-http,--project,--quiet,--trace-token,--user-output-enabled,--verbosity.Run
$ gcloud helpfor details. - NOTES
-
These variants are also available:
gcloud alpha model-armor floorsettings updategcloud beta model-armor floorsettings update
gcloud model-armor floorsettings update
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2026-03-24 UTC.