Reference documentation and code samples for the Access Context Manager V1 API class Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::EgressPolicy.
Policy for egress from perimeter.
[EgressPolicies]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
match requests based on egress_from and egress_to stanzas. For an
[EgressPolicy]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
to match, both egress_from and egress_to stanzas must be matched. If an
[EgressPolicy]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
matches a request, the request is allowed to span the [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter] boundary.
For example, an [EgressPolicy]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
can be used to allow VMs on networks within the [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to access a
defined set of projects outside the perimeter in certain contexts (e.g. to
read data from a Cloud Storage bucket or query against a BigQuery dataset).
[EgressPolicies]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
are concerned with the resources that a request relates as well as the
API services and API actions being used. They do not related to the
direction of data movement. More detailed documentation for this concept
can be found in the descriptions of [EgressFrom]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom]
and [EgressTo]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressTo].
(::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::EgressTo) — Defines the conditions on the [ApiOperation]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation]
and destination resources that cause this [EgressPolicy]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
to apply.
value (::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::EgressTo) — Defines the conditions on the [ApiOperation]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation]
and destination resources that cause this [EgressPolicy]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
to apply.
Returns
(::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::EgressTo) — Defines the conditions on the [ApiOperation]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation]
and destination resources that cause this [EgressPolicy]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
to apply.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-09 UTC."],[],[],null,["# Access Context Manager V1 API - Class Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::EgressPolicy (v0.11.0)\n\nVersion latestkeyboard_arrow_down\n\n- [0.11.0 (latest)](/ruby/docs/reference/google-identity-access_context_manager-v1/latest/Google-Identity-AccessContextManager-V1-ServicePerimeterConfig-EgressPolicy)\n- [0.10.1](/ruby/docs/reference/google-identity-access_context_manager-v1/0.10.1/Google-Identity-AccessContextManager-V1-ServicePerimeterConfig-EgressPolicy)\n- [0.9.0](/ruby/docs/reference/google-identity-access_context_manager-v1/0.9.0/Google-Identity-AccessContextManager-V1-ServicePerimeterConfig-EgressPolicy)\n- [0.8.2](/ruby/docs/reference/google-identity-access_context_manager-v1/0.8.2/Google-Identity-AccessContextManager-V1-ServicePerimeterConfig-EgressPolicy)\n- [0.7.2](/ruby/docs/reference/google-identity-access_context_manager-v1/0.7.2/Google-Identity-AccessContextManager-V1-ServicePerimeterConfig-EgressPolicy)\n- [0.6.0](/ruby/docs/reference/google-identity-access_context_manager-v1/0.6.0/Google-Identity-AccessContextManager-V1-ServicePerimeterConfig-EgressPolicy)\n- [0.5.2](/ruby/docs/reference/google-identity-access_context_manager-v1/0.5.2/Google-Identity-AccessContextManager-V1-ServicePerimeterConfig-EgressPolicy)\n- [0.4.0](/ruby/docs/reference/google-identity-access_context_manager-v1/0.4.0/Google-Identity-AccessContextManager-V1-ServicePerimeterConfig-EgressPolicy)\n- [0.3.0](/ruby/docs/reference/google-identity-access_context_manager-v1/0.3.0/Google-Identity-AccessContextManager-V1-ServicePerimeterConfig-EgressPolicy)\n- [0.2.0](/ruby/docs/reference/google-identity-access_context_manager-v1/0.2.0/Google-Identity-AccessContextManager-V1-ServicePerimeterConfig-EgressPolicy)\n- [0.1.2](/ruby/docs/reference/google-identity-access_context_manager-v1/0.1.2/Google-Identity-AccessContextManager-V1-ServicePerimeterConfig-EgressPolicy) \nReference documentation and code samples for the Access Context Manager V1 API class Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::EgressPolicy.\n\nPolicy for egress from perimeter.\n\n\n\\[EgressPolicies\\]\n\\[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy\\]\nmatch requests based on `egress_from` and `egress_to` stanzas. For an\n\\[EgressPolicy\\]\n\\[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy\\]\nto match, both `egress_from` and `egress_to` stanzas must be matched. If an\n\\[EgressPolicy\\]\n\\[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy\\]\nmatches a request, the request is allowed to span the \\[ServicePerimeter\\]\n\\[google.identity.accesscontextmanager.v1.ServicePerimeter\\] boundary.\nFor example, an \\[EgressPolicy\\]\n\\[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy\\]\ncan be used to allow VMs on networks within the \\[ServicePerimeter\\]\n\\[google.identity.accesscontextmanager.v1.ServicePerimeter\\] to access a\ndefined set of projects outside the perimeter in certain contexts (e.g. to\nread data from a Cloud Storage bucket or query against a BigQuery dataset).\n\n\u003cbr /\u003e\n\n\\[EgressPolicies\\]\n\\[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy\\]\nare concerned with the *resources* that a request relates as well as the\nAPI services and API actions being used. They do not related to the\ndirection of data movement. More detailed documentation for this concept\ncan be found in the descriptions of \\[EgressFrom\\]\n\\[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom\\]\nand \\[EgressTo\\]\n\\[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressTo\\]. \n\nInherits\n--------\n\n- Object \n\nExtended By\n-----------\n\n- Google::Protobuf::MessageExts::ClassMethods \n\nIncludes\n--------\n\n- Google::Protobuf::MessageExts\n\nMethods\n-------\n\n### #egress_from\n\n def egress_from() -\u003e ::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::EgressFrom\n\n**Returns**\n\n- ([::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::EgressFrom](./Google-Identity-AccessContextManager-V1-ServicePerimeterConfig-EgressFrom)) --- Defines conditions on the source of a request causing this \\[EgressPolicy\\] \\[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy\\] to apply.\n\n### #egress_from=\n\n def egress_from=(value) -\u003e ::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::EgressFrom\n\n**Parameter**\n\n- **value** ([::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::EgressFrom](./Google-Identity-AccessContextManager-V1-ServicePerimeterConfig-EgressFrom)) --- Defines conditions on the source of a request causing this \\[EgressPolicy\\] \\[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy\\] to apply. \n**Returns**\n\n- ([::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::EgressFrom](./Google-Identity-AccessContextManager-V1-ServicePerimeterConfig-EgressFrom)) --- Defines conditions on the source of a request causing this \\[EgressPolicy\\] \\[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy\\] to apply.\n\n### #egress_to\n\n def egress_to() -\u003e ::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::EgressTo\n\n**Returns**\n\n- ([::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::EgressTo](./Google-Identity-AccessContextManager-V1-ServicePerimeterConfig-EgressTo)) --- Defines the conditions on the \\[ApiOperation\\] \\[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation\\] and destination resources that cause this \\[EgressPolicy\\] \\[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy\\] to apply.\n\n### #egress_to=\n\n def egress_to=(value) -\u003e ::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::EgressTo\n\n**Parameter**\n\n- **value** ([::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::EgressTo](./Google-Identity-AccessContextManager-V1-ServicePerimeterConfig-EgressTo)) --- Defines the conditions on the \\[ApiOperation\\] \\[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation\\] and destination resources that cause this \\[EgressPolicy\\] \\[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy\\] to apply. \n**Returns**\n\n- ([::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::EgressTo](./Google-Identity-AccessContextManager-V1-ServicePerimeterConfig-EgressTo)) --- Defines the conditions on the \\[ApiOperation\\] \\[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation\\] and destination resources that cause this \\[EgressPolicy\\] \\[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy\\] to apply."]]