Reference documentation and code samples for the Cloud OS Config V1 API class Google::Cloud::OsConfig::V1::ListVulnerabilityReportsRequest.
A request message for listing vulnerability reports for all VM instances in
the specified location.
Inherits
Object
Extended By
Google::Protobuf::MessageExts::ClassMethods
Includes
Google::Protobuf::MessageExts
Methods
#filter
deffilter()->::String
Returns
(::String) —
This field supports filtering by the severity level for the vulnerability.
For a list of severity levels, see Severity levels for
vulnerabilities.
The filter field follows the rules described in the
AIP-160 guidelines as follows:
Filter for a specific severity type: you can list reports that
contain
vulnerabilities that are classified as medium by specifying
vulnerabilities.details.severity:MEDIUM.
Filter for a range of severities : you can list reports that have
vulnerabilities that are classified as critical or high by specifying
vulnerabilities.details.severity:HIGH OR
vulnerabilities.details.severity:CRITICAL
#filter=
deffilter=(value)->::String
Parameter
value (::String) —
This field supports filtering by the severity level for the vulnerability.
For a list of severity levels, see Severity levels for
vulnerabilities.
The filter field follows the rules described in the
AIP-160 guidelines as follows:
Filter for a specific severity type: you can list reports that
contain
vulnerabilities that are classified as medium by specifying
vulnerabilities.details.severity:MEDIUM.
Filter for a range of severities : you can list reports that have
vulnerabilities that are classified as critical or high by specifying
vulnerabilities.details.severity:HIGH OR
vulnerabilities.details.severity:CRITICAL
Returns
(::String) —
This field supports filtering by the severity level for the vulnerability.
For a list of severity levels, see Severity levels for
vulnerabilities.
The filter field follows the rules described in the
AIP-160 guidelines as follows:
Filter for a specific severity type: you can list reports that
contain
vulnerabilities that are classified as medium by specifying
vulnerabilities.details.severity:MEDIUM.
Filter for a range of severities : you can list reports that have
vulnerabilities that are classified as critical or high by specifying
vulnerabilities.details.severity:HIGH OR
vulnerabilities.details.severity:CRITICAL
#page_size
defpage_size()->::Integer
Returns
(::Integer) — The maximum number of results to return.
#page_size=
defpage_size=(value)->::Integer
Parameter
value (::Integer) — The maximum number of results to return.
Returns
(::Integer) — The maximum number of results to return.
#page_token
defpage_token()->::String
Returns
(::String) — A pagination token returned from a previous call to
ListVulnerabilityReports that indicates where this listing
should continue from.
#page_token=
defpage_token=(value)->::String
Parameter
value (::String) — A pagination token returned from a previous call to
ListVulnerabilityReports that indicates where this listing
should continue from.
Returns
(::String) — A pagination token returned from a previous call to
ListVulnerabilityReports that indicates where this listing
should continue from.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-09 UTC."],[],[],null,["# Cloud OS Config V1 API - Class Google::Cloud::OsConfig::V1::ListVulnerabilityReportsRequest (v1.4.0)\n\nVersion latestkeyboard_arrow_down\n\n- [1.4.0 (latest)](/ruby/docs/reference/google-cloud-os_config-v1/latest/Google-Cloud-OsConfig-V1-ListVulnerabilityReportsRequest)\n- [1.3.0](/ruby/docs/reference/google-cloud-os_config-v1/1.3.0/Google-Cloud-OsConfig-V1-ListVulnerabilityReportsRequest)\n- [1.2.1](/ruby/docs/reference/google-cloud-os_config-v1/1.2.1/Google-Cloud-OsConfig-V1-ListVulnerabilityReportsRequest)\n- [1.1.0](/ruby/docs/reference/google-cloud-os_config-v1/1.1.0/Google-Cloud-OsConfig-V1-ListVulnerabilityReportsRequest)\n- [1.0.1](/ruby/docs/reference/google-cloud-os_config-v1/1.0.1/Google-Cloud-OsConfig-V1-ListVulnerabilityReportsRequest)\n- [0.16.0](/ruby/docs/reference/google-cloud-os_config-v1/0.16.0/Google-Cloud-OsConfig-V1-ListVulnerabilityReportsRequest)\n- [0.15.2](/ruby/docs/reference/google-cloud-os_config-v1/0.15.2/Google-Cloud-OsConfig-V1-ListVulnerabilityReportsRequest)\n- [0.14.0](/ruby/docs/reference/google-cloud-os_config-v1/0.14.0/Google-Cloud-OsConfig-V1-ListVulnerabilityReportsRequest)\n- [0.13.0](/ruby/docs/reference/google-cloud-os_config-v1/0.13.0/Google-Cloud-OsConfig-V1-ListVulnerabilityReportsRequest)\n- [0.12.0](/ruby/docs/reference/google-cloud-os_config-v1/0.12.0/Google-Cloud-OsConfig-V1-ListVulnerabilityReportsRequest)\n- [0.11.0](/ruby/docs/reference/google-cloud-os_config-v1/0.11.0/Google-Cloud-OsConfig-V1-ListVulnerabilityReportsRequest)\n- [0.10.0](/ruby/docs/reference/google-cloud-os_config-v1/0.10.0/Google-Cloud-OsConfig-V1-ListVulnerabilityReportsRequest)\n- [0.9.1](/ruby/docs/reference/google-cloud-os_config-v1/0.9.1/Google-Cloud-OsConfig-V1-ListVulnerabilityReportsRequest) \nReference documentation and code samples for the Cloud OS Config V1 API class Google::Cloud::OsConfig::V1::ListVulnerabilityReportsRequest.\n\nA request message for listing vulnerability reports for all VM instances in\nthe specified location. \n\nInherits\n--------\n\n- Object \n\nExtended By\n-----------\n\n- Google::Protobuf::MessageExts::ClassMethods \n\nIncludes\n--------\n\n- Google::Protobuf::MessageExts\n\nMethods\n-------\n\n### #filter\n\n def filter() -\u003e ::String\n\n**Returns**\n\n- (::String) --- This field supports filtering by the severity level for the vulnerability.\n For a list of severity levels, see [Severity levels for\n vulnerabilities](https://cloud.google.com/container-analysis/docs/container-scanning-overview#severity_levels_for_vulnerabilities).\n\n The filter field follows the rules described in the\n [AIP-160](https://google.aip.dev/160) guidelines as follows:\n - **Filter for a specific severity type** : you can list reports that\n contain\n vulnerabilities that are classified as medium by specifying\n `vulnerabilities.details.severity:MEDIUM`.\n\n - **Filter for a range of severities** : you can list reports that have\n vulnerabilities that are classified as critical or high by specifying\n `vulnerabilities.details.severity:HIGH OR\n vulnerabilities.details.severity:CRITICAL`\n\n### #filter=\n\n def filter=(value) -\u003e ::String\n\n**Parameter**\n\n- **value** (::String) ---\n\n This field supports filtering by the severity level for the vulnerability.\n For a list of severity levels, see [Severity levels for\n vulnerabilities](https://cloud.google.com/container-analysis/docs/container-scanning-overview#severity_levels_for_vulnerabilities).\n\n The filter field follows the rules described in the\n [AIP-160](https://google.aip.dev/160) guidelines as follows:\n - **Filter for a specific severity type** : you can list reports that\n contain\n vulnerabilities that are classified as medium by specifying\n `vulnerabilities.details.severity:MEDIUM`.\n\n - **Filter for a range of severities** : you can list reports that have\n vulnerabilities that are classified as critical or high by specifying\n `vulnerabilities.details.severity:HIGH OR\n vulnerabilities.details.severity:CRITICAL`\n\n**Returns**\n\n- (::String) --- This field supports filtering by the severity level for the vulnerability.\n For a list of severity levels, see [Severity levels for\n vulnerabilities](https://cloud.google.com/container-analysis/docs/container-scanning-overview#severity_levels_for_vulnerabilities).\n\n The filter field follows the rules described in the\n [AIP-160](https://google.aip.dev/160) guidelines as follows:\n - **Filter for a specific severity type** : you can list reports that\n contain\n vulnerabilities that are classified as medium by specifying\n `vulnerabilities.details.severity:MEDIUM`.\n\n - **Filter for a range of severities** : you can list reports that have\n vulnerabilities that are classified as critical or high by specifying\n `vulnerabilities.details.severity:HIGH OR\n vulnerabilities.details.severity:CRITICAL`\n\n### #page_size\n\n def page_size() -\u003e ::Integer\n\n**Returns**\n\n- (::Integer) --- The maximum number of results to return.\n\n### #page_size=\n\n def page_size=(value) -\u003e ::Integer\n\n**Parameter**\n\n- **value** (::Integer) --- The maximum number of results to return. \n**Returns**\n\n- (::Integer) --- The maximum number of results to return.\n\n### #page_token\n\n def page_token() -\u003e ::String\n\n**Returns**\n\n- (::String) --- A pagination token returned from a previous call to `ListVulnerabilityReports` that indicates where this listing should continue from.\n\n### #page_token=\n\n def page_token=(value) -\u003e ::String\n\n**Parameter**\n\n- **value** (::String) --- A pagination token returned from a previous call to `ListVulnerabilityReports` that indicates where this listing should continue from. \n**Returns**\n\n- (::String) --- A pagination token returned from a previous call to `ListVulnerabilityReports` that indicates where this listing should continue from.\n\n### #parent\n\n def parent() -\u003e ::String\n\n**Returns**\n\n- (::String) --- Required. The parent resource name.\n\n Format: `projects/{project}/locations/{location}/instances/-`\n\n For `{project}`, either `project-number` or `project-id` can be provided.\n\n### #parent=\n\n def parent=(value) -\u003e ::String\n\n**Parameter**\n\n- **value** (::String) --- Required. The parent resource name.\n\n\n Format: `projects/{project}/locations/{location}/instances/-`\n\nFor `{project}`, either `project-number` or `project-id` can be provided. \n**Returns**\n\n- (::String) --- Required. The parent resource name.\n\n Format: `projects/{project}/locations/{location}/instances/-`\n\n For `{project}`, either `project-number` or `project-id` can be provided."]]