Example:
./terraformer import vault --resources=aws_secret_backend_role --token=YOUR_VAULT_TOKEN // or VAULT_TOKEN in env --address=YOUR_VAULT_ADDRESS // or VAULT_ADDR in env
./terraformer import vault --resources=policy --filter=policy=id1:id2:id4 --token=YOUR_VAULT_TOKEN // or VAULT_TOKEN in env --address=YOUR_VAULT_ADDRESS // or VAULT_ADDR in env
List of supported Vault resources:
ad_secret_backendad_secret_backend
ad_secret_backend_rolead_secret_backend_role
alicloud_auth_backend_rolealicloud_auth_backend_role
approle_auth_backend_roleapprole_auth_backend_role
aws_auth_backend_roleaws_auth_backend_role
aws_secret_backendaws_secret_backend
aws_secret_backend_roleaws_secret_backend_role
azure_auth_backend_roleazure_auth_backend_role
azure_secret_backendazure_secret_backend
azure_secret_backend_roleazure_secret_backend_role
cert_auth_backend_rolecert_auth_backend_role
consul_secret_backendconsul_secret_backend
consul_secret_backend_roleconsul_secret_backend_role
database_secret_backend_roledatabase_secret_backend_role
gcp_auth_backendgcp_auth_backend
gcp_auth_backend_rolegcp_auth_backend_role
gcp_secret_backendgcp_secret_backend
generic_secretgeneric_secret
github_auth_backendgithub_auth_backend
jwt_auth_backendjwt_auth_backend
jwt_auth_backend_rolejwt_auth_backend_role
kubernetes_auth_backend_rolekubernetes_auth_backend_role
ldap_auth_backendldap_auth_backend
ldap_auth_backend_groupldap_auth_backend_group
ldap_auth_backend_userldap_auth_backend_user
nomad_secret_backendnomad_secret_backend
okta_auth_backendokta_auth_backend
okta_auth_backend_groupokta_auth_backend_group
okta_auth_backend_userokta_auth_backend_user
pki_secret_backendpki_secret_backend
pki_secret_backend_rolepki_secret_backend_role
policypolicy
rabbitmq_secret_backendrabbitmq_secret_backend
rabbitmq_secret_backend_rolerabbitmq_secret_backend_role
ssh_secret_backend_rolessh_secret_backend_role
terraform_cloud_secret_backendterraform_cloud_secret_backend
token_auth_backend_roletoken_auth_backend_role