-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for not managing audit_config in google_project_iam_policy #6557
Comments
Hey @natalysheinin, we have two other types of IAM resources that will manage a policy without audit configs: *_iam_binding resources, which are an authoritative list of members for a specific role, and *_iam_member resources, which ensure that a specific member is present in the list for that role. We typically recommend that users use those less authoritative versions of the IAM resources, which also don't manage audit configs. Is there a specific reason why you need to be using the google_iam_policy resource, or would the binding/member resources work for you? |
I prefer using the If I couldn't use |
* avro_options added along with test * avro test file changed * markdown file updated * Suggested Changes in Spacing and Field Required Signed-off-by: Modular Magician <[email protected]>
* avro_options added along with test * avro test file changed * markdown file updated * Suggested Changes in Spacing and Field Required Signed-off-by: Modular Magician <[email protected]> Signed-off-by: Modular Magician <[email protected]>
This makes sense, we support |
Community Note
Description
It is not possible to manage
google_project_iam_policy
without managing theaudit_config
policy.New or Affected Resource(s)
Potential Terraform Configuration
References
b/374161751
The text was updated successfully, but these errors were encountered: