module
Version:
v0.0.1
Opens a new window with list of versions in this module.
Published: Sep 19, 2022
License: MIT
Opens a new window with license information.
README
¶
delstack
What is
Tool to force delete the entire CloudFormation stack, even if it contains resources that fail to delete by the CloudFormation delete operation.
Resource Types that can be forced to delete
Among the resources that fail in the normal CloudFormation stack deletion, this tool supports the following resources.
| RESOURCE TYPE |
DETAILS |
| AWS::S3::Bucket |
S3 Buckets, including buckets with Non-empty or Versioning enabled and DeletionPolicy not Retain.(Because "Retain" buckets should not be deleted.) |
| AWS::IAM::Role |
IAM Roles, including roles with policies from outside the stack. |
| AWS::ECR::Repository |
ECR Repositories, including repositories containing images. |
| AWS::Backup::BackupVault |
Backup Vaults, including vaults containing recovery points. |
| AWS::CloudFormation::Stack |
Nested Child Stacks that failed to delete. If any of the other resources are included in the child stack, they too will be deleted. |
| Custom::Xxx |
Custom Resources, but they will be deleted on its own. |
- This tool can be used even for stacks that do not contain any of the above targets for forced deletion.
- So all stack deletions can basically be done with this tool!!
- If there are resources other than those listed above that result in DELETE_FAILED, the deletion will fail.
- "Termination Protection" stacks will not be deleted. Because it probably really should not want to delete it.
Install
How to use
delstack -s <stackName> [-p <profile>] [-r <region>]
- -s, --stackName: required
- CloudFormation stack name
- -p, --profile: optional
- -r, --region: optional(default:
ap-northeast-1)
Directories
¶
|
|
|
|
|
|
cmd
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Click to show internal directories.
Click to hide internal directories.