Iam Audit Config Args
Import
IAM member imports use space-delimited identifiers; the resource in question, the role, and the account. This member resource can be imported using the org_id, role, and member e.g.
$ pulumi import gcp:organizations/iamAuditConfig:IamAuditConfig my_organization "your-orgid roles/viewer user:foo@example.com"IAM binding imports use space-delimited identifiers; the resource in question and the role. This binding resource can be imported using the org_id and role, e.g.
$ pulumi import gcp:organizations/iamAuditConfig:IamAuditConfig my_organization "your-org-id roles/viewer"IAM policy imports use the identifier of the resource in question. This policy resource can be imported using the org_id.
$ pulumi import gcp:organizations/iamAuditConfig:IamAuditConfig my_organization your-org-idIAM audit config imports use the identifier of the resource in question and the service, e.g.
$ pulumi import gcp:organizations/iamAuditConfig:IamAuditConfig my_organization "your-organization-id foo.googleapis.com"->Custom RolesIf you're importing a IAM resource with a custom role, make sure to use the full name of the custom role, e.g. organizations/{{org_id}}/roles/{{role_id}}. ->Conditional IAM BindingsIf you're importing a IAM binding with a condition block, make sure
$ pulumi import gcp:organizations/iamAuditConfig:IamAuditConfig to include the title of condition, e.g. `google_organization_iam_binding.my_organization "your-org-id roles/{{role_id}} condition-title"`Constructors
Functions
Properties
The organization ID. If not specified for gcp.organizations.IAMBinding, gcp.organizations.IAMMember, or gcp.organizations.IamAuditConfig, uses the ID of the organization configured with the provider. Required for gcp.organizations.IAMPolicy - you must explicitly set the organization, and it will not be inferred from the provider.
Service which will be enabled for audit logging. The special value allServices covers all services. Note that if there are google\_organization\_iam\_audit\_config resources covering both allServices and a specific service then the union of the two AuditConfigs is used for that service: the log_types specified in each audit_log_config are enabled, and the exempted_members in each audit_log_config are exempted.