Policy: GCP > Project > Organization Policy > Restrict VPC peering usage
Manage the GCP Organization Policy "Restrict VPC peering usage" for the project.
This list constraint defines the set of VPC networks that are allowed to be peered with the VPC networks belonging to this project, folder, or organization. By default, a Network Admin for one network can peer with any other network.
The allowed/denied list of networks must be identified in the form: under:organizations/ORGANIZATION_ID, under:folders/FOLDER_ID, under:projects/PROJECT_ID, or projects/PROJECT_ID/global/networks/NETWORK_NAME. This constraint is retroactive.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Related Policies
Controls
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/policy
- tmod:@turbot/gcp-orgpolicy#/policy/types/computeRestrictVpcPeering
- turbot graphql policy-type --id "tmod:@turbot/gcp-orgpolicy#/policy/types/computeRestrictVpcPeering"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/gcp-orgpolicy#/policy/types/computeRestrictVpcPeering"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI