You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
with module.secure-for-cloud_example_organization.module.cloud_bench[0].module.trust_relationship["org-child-project-1"].google_iam_workload_identity_pool.pool,
230
-
on .... in resource "google_iam_workload_identity_pool" "pool":
' module.secure-for-cloud_example_organization.module.cloud_bench[0].module.trust_relationship["org-child-project-1"].google_iam_workload_identity_pool.pool' as your import resource
Note: if you're using terragrunt, run `terragrunt import`
207
+
- For organizational setups, you can make use of a single workload-identity for all the organization, with the [/organization-org_compliance](./examples/organization-org_compliance)
208
+
- Alternatively, you can reactivate and import it, into your terraform state manually.
209
+
```bash
210
+
# re-activate pool and provider
211
+
$ gcloud iam workload-identity-pools undelete sysdigcloud --location=global
212
+
$ gcloud iam workload-identity-pools providers undelete sysdigcloud --workload-identity-pool="sysdigcloud" --location=global
213
+
214
+
# import to terraform state
215
+
# for this you have to adapt the import resource to your specific usage
with module.secure-for-cloud_example_organization.module.cloud_bench[0].module.trust_relationship["org-child-project-1"].google_iam_workload_identity_pool.pool,
230
+
on .... in resource "google_iam_workload_identity_pool" "pool":
' module.secure-for-cloud_example_organization.module.cloud_bench[0].module.trust_relationship["org-child-project-1"].google_iam_workload_identity_pool.pool' as your import resource
0 commit comments