Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow for enabling termination protection #669

Open
kddejong opened this issue Oct 16, 2018 · 4 comments
Open

Allow for enabling termination protection #669

kddejong opened this issue Oct 16, 2018 · 4 comments

Comments

@kddejong
Copy link

Not sure if protect should do both but it would be nice to have Termination Protection enabled on stacks created and the logic around it when doing a deletion. While Protect kind of works it doesn't protect us for folks outside of stacker

https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-protect-stacks.html

https://boto3.amazonaws.com/v1/documentation/api/latest/reference/services/cloudformation.html#CloudFormation.Client.create_stack

@phobologic
Copy link
Member

Thanks for this - it's definitely something we could add. Are you imagining that stacker would add the termination protection, but remove it whenever there is a destroy with --force? Basically this is just a method of keeping people from accidentally deleting stacks manually?

@kddejong
Copy link
Author

exactly. I'm cool with the flag being removed (turned off) during a destroy action. Or at least that is what I was going to do with the hooks you provide. So I'm partial to that strategy.

This would be to help prevent anyone accidentally deleting the stack from the console/cli or outside of our stacker automation pipelines.

Thanks.

@phobologic
Copy link
Member

Yeah, that sounds good. Probably wouldn't be too hard to deal with either. Could easily see this being the default mode as well.

@ejholmes
Copy link
Contributor

I think having this be a configurable global default would be nice. At Remind, it’d definitely make sense to make this the default for all of our stacks, just for added safety.

I think the difficult thing here for stacker is that this is changed via a separate API call to UpdateTerminationProtection. That’d wreak havic on performance if it were called on every stack update. If we only supported this for newly created stacks, then it’d probably be fine.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants