The resources used by each service are impacted by location in different ways. Before adding a resource locations constraint to your organization policy, review the appropriate section below to see how the resources you are applying the policy to will behave.
Agent Assist
Organization policy is enforced when you create a conversation profile
or a
knowledge base
resource in Agent Assist. Both resources are regional.
For a list of available locations and limitations, see the Agent Assist regionalization and data residency page.
Apigee
Resource locations constraints are enforced when creating the following Apigee resources:
For list of available locations, see Apigee locations.
Learn more about how to set an organization policy with resource locations constraints in Restricting resource locations.
AI Platform
Resource locations constraints apply to the following AI Platform resources:
- AI Platform Training's
job
resource - AI Platform Prediction's
job
resource - AI Platform Prediction's
model
resource
AI Platform Training and AI Platform Prediction resources only
support region locations. Constraints on multi-region locations and zone
locations have no effect on AI Platform. However, constraints on value
groups
that contain regions do have an effect. For example, the value asia
in an
organization policy has no effect on AI Platform, but the value
in:asia-locations
does have an effect.
Learn more about regions available for AI Platform Training and regions available for AI Platform Prediction.
AlloyDB for PostgreSQL
Organization policy is enforced when you create clusters, instances, and certain types of backups. The creation of on-demand backups is subject to the organization policy, while the creation of automated and continuous backups is exempted if enabled to prevent data loss.
AlloyDB for PostgreSQL only supports region locations. Constraints on multi-region locations and zone locations have no effect. However, constraints on value groups that contain regions do have an effect. For example, the value asia
in an organization policy has no effect, but the value in:asia-locations
does have an effect.
For a list of available locations, see AlloyDB for PostgreSQL locations.
Anti Money Laundering AI
Resource locations constraints apply to all Anti Money Laundering AI resources and are enforced at the time of resource creation.
For a list of available locations, see AML AI locations.
Apigee Integration API
The organization policy is enforced when you use the Apigee Integrations API to create the following resources:
- Integration
- Authorization configuration (AuthConfig)
- Certificate for AuthConfig
- Integration version
- SFDC (Salesforce) channel
- SFDC (Salesforce) instance
The organization policy is also enforced when you run, schedule, or test an integration.
Apigee integrations are region specific. It means that an integration created in a specific region, can access the resources only within that region.
For a list of available locations where you can create your integrations, see Supported Regions.
App Engine
App Engine is a property of the application
resource.
The location property is enforced for all environments when you create an
application
. You can create only one App Engine application
in each
project. A Cloud Storage bucket is automatically created in the same location
as the application
. If you create an application
with a broad location that
doesn't comply with the organization policy, you will have to create a new
project and App Engine application
.
When you disable an application
, it won't be served in future, but replicated
code and data will remain in locations the application
was stored in. To
completely erase this data, delete the parent project.
The App Engine flexible environment is built on top of Compute Engine. Auto-scaling instances can fail if any locations where scaling happens aren't in the list of allowed locations that are defined in the organization policy.
For a list of available locations, see App Engine Locations.
Application Integration API
The organization policy is enforced when you use the Application Integration API to create the following resources:
- Integration
- Integration version
- Execution
- Suspension
- Authorization configuration (AuthConfig)
- SFDC (Salesforce) instance
- SFDC (Salesforce) channel
The organization policy is also enforced when you run, schedule, or test an integration.
Application Integration is regional, which means that an integration created in a specific region can access the resources only within that region.
For a list of available locations, see Application Integration locations.
Limitations
The following Application Integration resources don't support the resource location constraints that you specify:
- Email subject and email body of Send Email task
- Certificate for AuthConfig
- Build integrations with Gemini
Artifact Registry
You can create repositories in a multi-region or region. Artifact Registry enforces organization policy when you create a repository.
Organization policy compliance isn't enforced retroactively. Artifacts can be added to any existing repository, even if the repository location is denied by the resource locations organization policy. To enforce a new resource locations organization policy on existing repositories, create new repositories after the organization policy is applied, and then migrate artifacts from old repositories to the new ones. You can use the gcrane tool to copy images between repositories.
For a list of available locations, see the Artifact Registry documentation.
Audit Manager
When you run a new audit, the organization policy is enforced based on the region that you specified when creating the audit request. When the location of the audit is selected as global, it is not subjected to the resource locations constraint.
For a list of available regional locations, see Audit Manager locations.
Backup for GKE
Organizational policy is enforced when you create either of the top-two regional resources:
BackupPlan
: the location of this resource determines the target region where all backup data is stored for backups created below this plan. There may be multipleBackupPlan
resources in a project.RestorePlan
: the location of this resource controls the allowable region of the target cluster into which data from a backup is restored. There may be multipleRestorePlan
resources in a project
For more information, see Backup for GKE locations.
BigQuery
BigQuery dataset
resources can be both regional and multi-regional.
Organization policy compliance isn't enforced retroactively. To enforce a new
resource locations constraint on an existing dataset
, delete the
dataset
resource and create it again with the organization policy applied
to the parent resource.
You can create Database
resources within a dataset
resource with a location
that is denied by the resource locations organization policy. The location of
the dataset
resource doesn't dictate the location of the database
resource. To enforce a new resource locations constraint on an existing
database
, delete the database
resource and create it again with the
organization policy applied to the parent resource.
For a list of available locations, see the BigQuery Dataset Locations page.
BigQuery Data Transfer Service
The TransferConfig
resource can be both regional and multi-regional. Organization policy compliance
isn't enforced retroactively. Organization policy is checked only when creating
a TransferConfig
. To enforce a new resource locations constraint on an
existing TransferConfig
, delete the TransferConfig
resource and create it
again with the organization policy applied to the parent resource.
For a list of available locations, see BigQuery Data Transfer Service locations.
BigQuery Migration Service
The MigrationWorkflow
resource
describes the tasks and subtasks that constitutes the migration workflow. They
can be created by using the Google Cloud console or the API when running the migration
assessment or SQL translation.
The migration workflow must be created in the same location as the
resources that it uses. For example, if your BigQuery
dataset and the Cloud Storage bucket are in the US
multi-region then the
migration workflow can be created in the US
multi-region or the us-west1
region.
Organization policy is checked only when creating a migration workflow, because it is an immutable resource.
For a list of available locations, see BigQuery Migration Service locations.
Certificate Authority Service
CA Service resources such as certificate templates, certificate authority (CA) pools, and CAs can be created in any available location. These resources can't be moved after creation.
Certificate templates can be replicated using Google Cloud CLI commands. You can use gcloud CLI commands to create resources with the same name in another supported location. For more information, see Creating certificate templates.
CAs can be cloned from existing CAs in the same CA pool. These new CAs are created in the same location as the CA from which they were cloned. For more information, see Creating certificate authorities.
For the list of available locations, see CA Service locations.
Bigtable
A Bigtable instance resource is a logical container of clusters. Each of these clusters is located in a zone. All data in an instance is replicated uniformly to all clusters that are contained in that instance. Organization policy is enforced when a cluster is created. You can't create new storage containers in a location that is denied by the organization policy. Existing instances and clusters will continue to operate even if they are in locations that are denied by a subsequent change to the organization policy.
You can manually remediate resources that violate a new organization policy, by deleting them and recreating them once the organization policy is put into place. For example, if you had a multi-cluster instance in which one cluster violated a new organization policy, you could delete it and then add a new cluster in a permitted zone.
For a list of available locations, see the Bigtable Locations page.
Cloud Build
Organization policy is enforced when you create new regional Cloud Build resources. Although you can create resources in any region, Cloud Build ensures that you select a region approved by your organization. Organization policy is only enforced on newly created Cloud Build resources in a non-global region after you create the organization policy.
For a list of available regions, see the Cloud Build locations page.
Certificate Manager
Except for CertificateMaps
and CertificateMapEntries
which can be global only, Certificate Manager resources can be created in any regional or global locations. However, you can't choose a zone for a resource. The organization policy is enforced at the time that you create the Certificate Manager resource.
For a list of available locations, see Products available by location.
Cloud Composer
A Cloud Composer environment is a logical container for the resources listed below. During the environment creation process, you choose a location (region/zone) for the environment and the underlying resources are created based on the location selected.
Google Kubernetes Engine cluster
Cloud SQL instance
App Engine VM(s) running Airflow web server
Persistent Disks: Used by the Airflow Webserver and GKE cluster
Pub/Sub topics
Building and Storing Airflow images with custom Python dependencies
When location restrictions are not specified then depending on the configuration Composer might build Airflow images either within GKE cluster or using Cloud Build. Read more about it in Installing a Python dependency to a private IP environment. Depending on Composer version Airflow images might be stored in the selected region (using Artifact Registry) or multi-region to which the selected region belongs to (using Container Registry).
If location restrictions are specified, Cloud Composer builds Airflow images within the environment's GKE cluster and stores them in Artifact Registry repository in the selected region.
Cloud Monitoring: Stores metrics for environments and executed Airflow DAGs in the region you specify
- Some metric labels may contain names of DAGs and Cloud Composer environments.
Cloud Logging: By default, Cloud Composer stores in Cloud Logging which is a global Google Cloud service. If you want to store Cloud Composer logs in a specific location, you must redirect logs to a Cloud Storage bucket in this location.
For a list of available locations, see Cloud Composer Regions.
The Cloud Composer documentation provides more information on the architectural details of Cloud Composer environments.
Cloud Data Fusion
Organization policy is enforced when you create an instance. The instance is a regional resource that is created in the region that you specify.
When you create an instance with a customer-managed encryption key (CMEK), the key location must be the same as the instance location.
By default, Cloud Data Fusion creates ephemeral Dataproc clusters in the same region as the instance for each pipeline. The location for these ephemeral clusters can be changed and isn't enforced by the resource locations organization policy. For static Dataproc clusters, you can use any of the locations supported by Dataproc and these locations aren't enforced by the resource locations organization policy.
For a list of available locations, see Cloud Data Fusion supported regions.
Cloud Deploy
The following are the Cloud Deploy resource types:
- Delivery pipeline
- Target
- Release
- Rollout
- Job run
All Cloud Deploy resources are created in the same region where the delivery pipeline was created.
If you have an organization policy against using certain locations, you can't create any Cloud Deploy resources in that region (delivery pipeline, target, release, or rollout).
For a list of available locations for the Cloud Deploy service and its resources, see About Cloud Deploy regions.
Cloud Run functions
Organization policy is enforced when you create or update a Cloud Run function resource. It is not enforced on any already existing resources.
For a list of available regions, see Cloud Run functions locations.
Cloud Healthcare API
The organization policy is enforced when you create a dataset
resource.
dataset
resources are either regional or multi-regional resources.
Data store resources, such as FHIR store, or other lower-level resources, such as
HL7v2 messages, can be added to any existing dataset
, even if the dataset
resource is in a location that is denied by the organization policy. To
ensure that your resources are in compliance with the resource location
constraint, create new dataset
resources after the organization policy is
applied, and then migrate data from old dataset
resources to the new ones.
For a list of available locations, see Cloud Healthcare API Regions.
Cloud Interconnect
A Cloud Interconnect attachment can be created in any region. However, you can't choose a zone. The organizational policy is enforced at the time that you create the Cloud Interconnect attachment.
For a list of available regions, see the Compute Engine Regions and zones page.
Cloud Intrusion Detection System
Organization policy is enforced when you create a Cloud IDS endpoint, which is a zonal resource. Organization policy compliance isn't enforced retroactively. Existing endpoints will continue to operate even if they are in locations that are denied by the organization policy. To enforce a new resource location constraint on an existing Cloud IDS endpoint, delete the instance and then create it again with the organization policy applied.
For a list of available locations, see Products available by location.
Cloud Key Management Service
Cloud KMS resources can be created in regional, dual-regional, multi-regional, or global locations. The organization policy will be enforced at the time you create that resource.
For more information, see the Cloud KMS locations page.
Cloud Logging
Organization policy is enforced when you create new log
buckets. While you can create a new bucket
in any region or set its location to global
, Logging ensures
that you select a region approved by your organization. Organization policy is
only enforced on newly created log buckets after you create your organization
policy.
For a list of available regions, see the Regionalization section of the Cloud Logging storage overview page.
Cloud NAT
A Cloud NAT gateway can be created in any regional location. However, you can't choose a zone for a Cloud NAT gateway. The organizational policy is enforced at the time that you create the Cloud NAT gateway.
For a list of available regional locations, see the Compute Engine Regions and zones page.
Cloud Router
A Cloud Router can be created in any regional location. However, you can't choose a zone for a Cloud Router. The organizational policy is enforced at the time that you create the Cloud Router.
For a list of available regional locations, see the Compute Engine Regions and zones page.
Cloud Load Balancing
Load balancers using the following products can be created in any regional location:
- regional external Application Load Balancer
- regional external proxy Network Load Balancer
- regional internal Application Load Balancer
- regional internal proxy Network Load Balancer
- external passthrough Network Load Balancer
- internal passthrough Network Load Balancer
However, you cannot choose a zone for these load balancers. The organizational policy is enforced at the time that you create the load balancing resource.
For a list of available regional locations, see the Compute Engine Regions and zones page.
Google Cloud Armor
When you create a Google Cloud Armor security policy, the organization policy is enforced based on the region you specify in the creation request. The policy is not enforced on already existing resources. Global resources are not subject to the resource locations constraint.
For a list of available regional locations, see the Compute Engine Regions and zones page.
Cloud Run
Organization policy is enforced when you create a top-level resource, such as a
Service
. It is not enforced on any already existing resources or on updates to
existing resources, even if those updates lead to the creation of a lower level
resource, such as a Revision
.
For a list of available regions, see the Cloud Run locations page.
Cloud Service Mesh
Organization policy is enforced when you attempt to provision Cloud Service Mesh or create workloads for the mesh. Cloud Service Mesh does not enforce organization policies when workloads are registered to the mesh.
See relevant documentation for your specific service workloads:
See the list of available regions for your Cloud Service Mesh computing infrastructure:
Spanner
Organization policy is enforced when you create an instance. Instances are either regional or multi-regional resources. If an instance is blocked by the resource locations organization policy, the only way to bring the resource into compliance is by deleting the instance. Instances that are blocked by the resource locations organization policy will still allow for reads, writes, and the creation of database resources.
For a list of available locations, see the Spanner Instances page.
Cloud SQL
Organization policy is enforced when you create an instance. The instance is a regional resource that will create a zonal database, for which the resource location is not enforced. When you create read replicas or database clones, you locate the new resources in the same region as the original, so the resource locations organization policy isn't enforced.
For a list of available locations, see the Cloud SQL Instance Locations page.
Cloud Storage
Organization policy is enforced when you create a bucket
resource. Bucket
resources are regional or multi-regional. Object
resources can be added to
any existing bucket
even if the object
is in a location that is denied by
the resource locations organization policy. To ensure that your
resources are in compliance with the resource locations organization policy,
create new bucket
resources after the organization policy is applied, and then
migrate data from old bucket
resources to the new ones.
For a list of available locations, see the Cloud Storage Bucket Locations page.
Cloud Tasks
Organization policy is enforced when you create a queue. It is not enforced on queues that were created before the organization policy was set, or on updates to such queues.
For a list of available locations, see Products available by location.
Limitations
Limitations apply to the following regions:
us-central1
us-central2
(private Google Cloud region)
When you have any of the regions mentioned earlier in your organization policy,
you must include both us-central1
and us-central2
, even if you are not
creating Cloud Tasks resources in these regions. You can include the region
us-central2
in your organization policy even if your organization doesn't
use private regions.
Cloud Translation - Advanced API (v3)
To ensure that your Cloud Translation resources are in compliance with the resource location constraint, specify a regional endpoint when creating the resource. The resource location constraint is enforced when you create a Cloud Translation resource.
For information about how to use regional endpoints, see Specify a regional endpoint.
Cloud VPN
A Cloud VPN gateway can be created in any regional location. However, you can't choose a zone for a Cloud VPN gateway. The organization policy is enforced at the time that you create the Cloud VPN gateway.
For a list of available regional locations, see the Compute Engine Regions and zones page.
Cloud Workstations
Organization policy is enforced when you create new regional resources such as workstation clusters, workstation configurations, and workstations. Creation of a workstation configuration might result in the creation of Compute Engine persistent disks and VMs, so you can create these resources only in zones that your organization policy allows.
For a list of available locations, see Cloud Workstations locations.
Compute Engine
Compute Engine offers a variety of resources, and these can be global, regional, or zonal. Regional and zonal resources are subject to the resource location constraints. Global resources are not subject to the resource locations constraint, but some global resources use regional and zonal resources; those regional and zonal resources are subject to the resource locations constraint.
For example, an instance template is a global resource, but you might specify regional or zonal disks in an instance template. Those disks are subject to the resource locations constraints, so, in your instance template, you must specify disks in regions and zones that your org policy permits.
Limitations
All Compute Engine resources support the resource location constraints that you specify, with the following exceptions.
Snapshots and images
- When you create a snapshot or image, you must specify a storage location in a permitted location, otherwise the creation of the snapshot or image might fail.
Managed instance groups
Some managed instance group (MIG) operations rely on the creation or recreation of VMs in permitted zones. These operations include: scaling out (manually or through autoscaling), autohealing, autoupdating, and proactive instance redistribution. For those operations to succeed, your MIGs must exist in locations that are allowed by your org's resource location constraint.
Create MIGs in permitted locations. For regional MIGs, select zones that are not location restricted.
If you have a pre-existing zonal or regional MIG, and later set a resource location constraint, MIG operations will fail if they violate the constraint. You must recreate the MIG in a permitted location.
Sole-tenant nodes
- If you have a pre-existing node group and later set a resource location constraint, you can't scale out the group to add new hosts (manually or through autoscaling) if the group's location violates the constraint.
For a list of available locations, see the Compute Engine Regions and Zones page.
Config Controller
Config Controller uses Compute Engine regions and zones. Enforcement of the resource locations is handled at the level of the Compute Engine resource when you create the cluster. To scale a cluster by adding more instances these new additions must also be in an allowed location.
To create clusters with sufficient redundancy, use value groups to control the locations that are restricted. If you set the locations manually, all zones in that region must be in the allowed list to have the same level of redundancy. Auto-scaling clusters can break if any of the locations in which scaling happens aren't in the list of allowed locations defined in the organization policy.
Conversational Insights
The organization policy is enforced when you create a conversation
in
Conversational Insights. conversation
resources are regional.
For a list of available locations, see the Conversational Insights locations page.
Data Lineage API
Organization policy is enforced when you create or update a Process
using
either the CreateProcess, UpdateProcess, or ProcessOpenLineageRunEvent
method.
Children resources (Runs
or Events
) can be updated or added to any existing
Process
even if the Process
is in a location that is denied by the resource
location organization policy. To ensure that all your resources are in compliance
with the resource location organization policy, create new Process
after the
organization policy is applied.
Dataflow
The organization policy is enforced when you create a job
. A job
is a
regional resource that uses both Cloud Storage and Compute Engine.
You can configure Compute Engine workers to execute in a zone outside
the region of the job by specifying the zone parameter. In this case, the
Dataflow control plane will execute in the specified region,
while data processing workers will execute in the specified zone. If you don't
specify the zone of workers, the workers will be created within the region in
which the job
is configured to run.
If you don't specify the zone of the job
, the location of the workers will be
in one of the zones within the region in which the job
is configured to run.
Dataflow will select the zone based on the available capacity
in the zone. All zones within the region of the job
should be set as allowed
values in the resource locations organization policy.
Auto-scaling clusters can break if any of the locations in which scaling happens aren't in the list of allowed locations defined in the organization policy.
For a list of available locations, see the Dataflow Regional endpoints page.
Dataform
Dataform resources are regional. When you create a Dataform repository, the repository and all its child resources are constrained to the region specified on repository creation.
For a list of available locations, see Dataform locations.
Dataplex
The organization policy is enforced when you create any of the following Dataplex resources:
The policy is enforced when the resource is created. Applying a resource locations constraint doesn't affect existing resources or updates to those resources.
Dataproc
When you create a cluster
, the organization policy is enforced based on the
region you specify in the creation request. The location of a job
is
bound by the location of the cluster
that is its parent when the
submit
method is called.
For a list of available locations, see the Dataproc Regional endpoints page.
Dataproc Metastore
When you create a service
, the organization policy is enforced based on the
region you specify in the creation request. The location of backups
and
metadataImports
are bound by the location of the service
that is its parent
when the importMetadata
and backupService
methods are called.
For a list of available locations, see the Dataproc Metastore locations page.
Datastore
The Datastore database
resources are directly dependent on the
App Engine application in the parent project and its defined location.
Disabling the App Engine application will block API access for the associated
database. To delete replicated data from the physical locations, delete the
project as described in the App Engine section.
For a list of available locations, see the Datastore Locations page.
Dialogflow
Organization policy is enforced when you create an agent
or a location setting
resource in Dialogflow CX (Dialogflow ES doesn't enforce
organization policy yet). Both agent
resources and location setting
resources
are regional or multi-regional. Other Dialogflow resources, such as intents
or flows
, can be added to any existing agent
, even if the agent
resource
is in a location that is denied by the organization policy. To ensure that your
resources are in compliance with the resource location constraint, create new
agent
resources after the organization policy is applied, and then migrate
data from the old agent
resources to the new ones.
For a list of available locations, see the Dialogflow Locations page.
Document AI
Document AI resources are regional. When you create a Processor
or
LabelerPool
resource, the resource location organization policy is enforced
and restricts the regions in which new resources can be created or stored.
Organization policy compliance isn't enforced retroactively. New Document AI resources can be created under existing parent resources, even if the parent's resource location is denied by the resource locations organization policy. To enforce a new resource location constraint on an existing resource, delete the resource and create it again with the organization policy applied.
For a list of available locations, see the Document AI Multi-regional support page.
Eventarc
Organization policy is enforced when you create an Eventarc trigger. The policy is not enforced on already existing resources or on updates to existing resources. Triggers can be either a global or regional resource. Global resources are not subject to the resource locations constraint.
If the resource locations constraint is enforced, only regional triggers whose
regions exactly match those applied in the resource locations constraint or are
included in the
value group
can be created. For example, if either us-central1
or us-locations
are in
the list of allowed locations defined in the organization policy, you can create
a us-central1
trigger.
For a list of available locations, see Eventarc locations.
Filestore
Organization policy is enforced when you create a Filestore instance, which can be a zonal or regional resource. Organization policy compliance isn't enforced retroactively. Existing instances will continue to operate even if they are in locations that are denied by the organization policy. To enforce a new resource location constraint on an existing Filestore instance, delete the instance and then create it again with the organization policy applied.
For a list of available locations, see the Filestore Regions and Zones page.
Firestore
The Firestore database
resources are directly dependent on the
App Engine application in the parent project and its defined location.
Disabling the App Engine application will block API access for the associated
database. To delete replicated data from the physical locations, delete the
project as described in the App Engine section.
For a list of available locations, see the Firestore Locations page.
Cloud Next Generation Firewall Enterprise
Organization policy is enforced when you create a Cloud NGFW Enterprise endpoint, which is a zonal resource. Organization policy compliance isn't enforced retroactively. Existing endpoints will continue to operate even if they are in locations that are denied by the organization policy. To enforce a new resource location constraint on an existing Cloud NGFW Enterprise endpoint, delete the instance and then create it again with the organization policy applied.
For a list of available locations, see Products available by location.
Secure Web Proxy
A Secure Web Proxy can be created in any regional location. However, you can't choose a zone for a Secure Web Proxy. The organizational policy is enforced at the time that you create the Secure Web Proxy.
For a list of available locations, see Products available by location.
Fleet
Cloud Fleet membership
resource only supports region locations in
Compute Engine regions and zones.
Enforcement of the resource locations is handled at the level of the
membership
resource when you register a cluster. Fleet memberships are
supported in global and regional locations.
To create memberships with sufficient redundancy, use value
groups
to control the regions that are restricted. Constraints on multi-region
locations and zone locations have no effect on Fleet membership
. However,
constraints on value groups that contain regions do have an effect. For example,
the value asia
in an organization policy has no effect on Fleet membership,
but the value in:asia-locations
does have an effect.
Generative AI on Vertex AI
Resource locations constraints apply to all Generative AI on Vertex AI resources. Organization policy compliance isn't retroactively enforced. This means that applying a resource locations constraint doesn't affect any pre-existing resources or updates to those resources. Google models are not Google Cloud resources, and resource locations constraints don't apply to them.
For a list of available regions, see Generative AI on Vertex AI locations.
GKE Multi-Cloud
The organization policy is enforced when you use the GKE Multi-Cloud API to create the following clusters:
- GKE on AWS
- GKE on Azure
- GKE attached clusters
For a list of available locations, see the following pages for each cluster platform.
- GKE on AWS regions
- GKE on Azure regions
- GKE attached clusters: EKS regions
- GKE attached clusters: AKS regions
- GKE attached clusters: CNCF conformant clusters regions
Google Kubernetes Engine
Google Kubernetes Engine uses Compute Engine regions and zones. Enforcement of the resource locations is handled at the level of the Compute Engine resource when you create the VM for a cluster. If you want to scale a cluster by adding more instances or adding another zone, these new additions must also be in an allowed location.
To create clusters with sufficient redundancy, use value groups to control the locations that are restricted. If you set the locations manually, all zones in that region must be in the allowed list to have the same level of redundancy. Auto-scaling clusters can break if any of the locations in which scaling happens aren't in the list of allowed locations defined in the organization policy.
Infrastructure Manager
Infrastructure Manager uses these Google Cloud regions for creating Infra Manager Deployments.
Additionally, Infrastructure Manager uses HCL as the configuration language to actuate resources using Terraform.
Resource location constraints are enforced for both Infra Manager Deployment resources as well as the supported Google Cloud resources defined in HCL.
Integration Connectors API
The organization policy is enforced when you use the Integration Connectors API to create the following resources:
For a list of available locations, see Integration Connectors locations.
Looker (Google Cloud core)
Looker (Google Cloud core) resources can be created in regional locations. The organization policy will be enforced at the time you create that resource.
For a list of available regions, see the Create a Looker (Google Cloud core) instance page.
Managed Service for Microsoft Active Directory
Organization policy is enforced when you create Managed Microsoft AD
domains or update existing AD resources. Managed Microsoft AD requires the
global
location to be allowed. If the global
location is not allowed, domain
creation and resource updates will fail.
Learn how to
view and update the resource location constraint to global
.
Memorystore for Memcached
The organization policy is enforced when you create an instance. The instance is a regional resource that creates one or more zonal caches depending on the number of nodes selected. When you add nodes using a scale-up operation, you locate the new resources in the same region as the original instance. The location organization policy is enforced during scale-up.
For a list of available locations, see the Memorystore for Memcached Regions and Zones page.
Memorystore for Redis
Organization policy is enforced when you create an instance. The instance is a regional resource that will create one or more zonal caches depending on the selected instance tier. Basic tier instances deploy a single cache within a specified region and zone. Standard tier instances deploy a zonal cache and one or more zonal cache replicas which are located within the instance's region. When you create additional replicas, you locate the new resources in the same region as the original zonal cache. The location organization policy is enforced when creating additional replicas.
For a list of available locations, see the Memorystore for Redis Regions and Zones page.
Memorystore for Redis Cluster
Organization policy is enforced when you create an instance. The instance is a regional resource that will create one or more zonal caches depending on selected zone distribution mode. When you create additional replicas or shards, you locate the new resources in the same region as the original zonal cache. The location organization policy is enforced when creating additional replicas.
For a list of available locations, see the Memorystore for Redis Cluster Locations page.
Network Connectivity Center
Network Connectivity Center Hub and VPC Spoke resources can be created in the global location. Network Connectivity Center Hybrid Spoke resources can be created in any regional location. The organization policy will be enforced at the time you create that resource.
For a list of available regional locations, see the Compute Engine Regions and zones page.
Network Intelligence Center - Connectivity Tests
Connectivity Tests resources can be created in the global location. The organization policy will be enforced at the time you create that resource.
Persistent Disk
The organization policy is enforced when you create a disk
resource, which can
then be attached to virtual machines:
- After you create a zonal
disk
resource, you can attach it to virtual machine instances in the same zone. - After you create a regional
disk
resource, you can attach it to virtual machine instances in one of the two zones thedisk
resides in.
Organization policy compliance isn't enforced retroactively. To enforce a
new resource locations organization policy on existing disk
resources, you
need to delete the disk
resources and then create them again with the
organization policy applied to the parent resource.
For a list of available locations, see the Compute Engine Regions and Zones page.
Pub/Sub
The resource locations organization policy affects the locations in
which messages published to a topic
can be persisted at rest. The
organization policy is enforced when you publish messages to a topic
. Note
that a topic
is still a global resource that is accessible from anywhere in
the world to authorized clients.
Changes to the organization policy are not retroactive, and will not be
applied to existing topics
. If a new resource locations constraint denies
a location where messages published to a topic
are already stored, those
messages will not be automatically moved.
For more information, see the Pub/Sub Restricting Pub/Sub resource locations page.
Pub/Sub Lite
The resource locations organization policy affects the locations in which a
topic
can be created, which determines where messages will be persisted.
A topic
is a zonal resource, but messages can be requested from any location,
including outside of Google Cloud.
Changes to the organization policy are not retroactive, and will not be
applied to existing topics
. If a new resource locations constraint denies
a location where messages published to a topic
are already stored, those
messages will not be automatically moved.
Secret Manager
Secrets can have either an automatic replication policy or a user managed replication policy.
When using an automatic replication policy, payload data is replicated without
restriction. Secret Manager requires the global
location to be
allowed when creating a secret with an automatic replication policy. If the
global
location is not allowed, secret creation will fail.
When using a user managed replication policy, payload data is replicated to a user-defined set of supported locations. Secret Manager requires all locations in the replication policy to be allowed when creating a secret with a user managed replication policy. If any of the locations in a secret's replication policy are not allowed, secret creation will fail.
The organization policy will be enforced at the time you create that secret.
For more information, see the Secret Manager locations page.
Serverless VPC Access
Organization policy is enforced when you create new Serverless VPC Access connector instances. Organization policy is only enforced on newly created Serverless VPC Access connector instances in a region after you create the organization policy.
For more information, see the Serverless VPC Access Supported Regions.
Secure Source Manager
Organization policy is enforced when you create new Secure Source Manager instances. Secure Source Manager ensures that you select a region approved by your organization. Organization policy is only enforced on newly created Secure Source Manager instances in a region after you create the organization policy.
For more information, see the Secure Source Manager overview page.
Sensitive Data Protection
Resource location constraints apply to all Sensitive Data Protection resources.
Changes to the organization policy are not retroactive and will not be applied to existing resources.
Learn more about regions available for Sensitive Data Protection.
Speaker ID
The resource locations organization policy affects the locations in which a
speaker
resource can be created, which determines where enrollment phrases and
voiceprints are stored.
The resource locations organization policy also affects the locations in which
settings
can be updated.
Learn more about Speaker ID available regions.
Speech-to-Text
The resource locations organization policy affects the locations in which
any Speech-to-Text resource can be created. It also affects the locations in
which the config
resource can be updated.
Speech-to-Text v1 is available in the global
, eu
, and us
regions. Learn more
about Speech-to-Text v2 available regions.
Timeseries Insights API
Resource locations constraints apply to all Timeseries Insights API resources.
Timeseries Insights API only supports region locations. An integration
created in a specific region can only access the resources within that region.
Constraints on multi-region locations and zone locations have no effect on
Timeseries Insights API. However, constraints on
value groups
that contain regions do have an effect. For example, the value asia
in an
organization policy has no effect on Timeseries Insights API, but the value
in:asia-locations
does have an effect.
For a list of available locations where you can create your integrations, see Supported Regions.
Transcoder API
job
and jobTemplate
resources are regional. You can specify a location
when creating the resource. The organization policy is enforced at the time
you create the resource.
For a list of available regions, see Transcoder API locations.
Vertex AI
Resource locations constraints apply to all Vertex AI resources
except for DataLabelingJob
resources.
Vertex AI only supports region locations. Constraints on multi-region
locations and zone locations have no effect on Vertex AI. However,
constraints on value
groups
that contain regions do have an effect. For example, the value asia
in an
organization policy has no effect on Vertex AI, but the value
in:asia-locations
does have an effect.
Learn more about regions available for AI Platform Training.
Vertex AI Search
Resource locations constraints apply to all Vertex AI Search resources. Organization policy compliance isn't retroactively enforced. This means that applying a resource locations constraint doesn't affect any pre-existing resources or updates to those resources.
For a list of available regions, see Vertex AI Search locations.
Virtual Private Cloud
Virtual Private Cloud (VPC) networks are global virtual networks that contain regional virtual subnetworks (subnets). Resource location constraints don't apply to VPC networks, because they are global resources. Resource location constraints are enforced on subnetworks at the time of subnetwork creation. If you create an auto mode VPC network, subnetworks are created only in the regions that are allowed by the resource location constraint.
For a list of available regions, see the Compute Engine Regions and zones page.
Workflows
Organization policy is enforced when you create a Workflows workflow. The policy is not enforced on already existing resources or on updates to existing resources. Workflows are regional resources and are subject to the resource locations constraint.
If the resource locations constraint is enforced, only workflows whose regions
exactly match those applied in the resource locations constraint or are included
in the
value group
can be created. For example, if either us-central1
or us-locations
are in
the list of allowed locations defined in the organization policy, you can create
a us-central1
workflow.
For a list of available locations, see Workflows locations.