-
Notifications
You must be signed in to change notification settings - Fork 167
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow for enabling termination protection #669
Comments
Thanks for this - it's definitely something we could add. Are you imagining that stacker would add the termination protection, but remove it whenever there is a destroy with --force? Basically this is just a method of keeping people from accidentally deleting stacks manually? |
exactly. I'm cool with the flag being removed (turned off) during a destroy action. Or at least that is what I was going to do with the hooks you provide. So I'm partial to that strategy. This would be to help prevent anyone accidentally deleting the stack from the console/cli or outside of our stacker automation pipelines. Thanks. |
Yeah, that sounds good. Probably wouldn't be too hard to deal with either. Could easily see this being the default mode as well. |
I think having this be a configurable global default would be nice. At Remind, it’d definitely make sense to make this the default for all of our stacks, just for added safety. I think the difficult thing here for stacker is that this is changed via a separate API call to UpdateTerminationProtection. That’d wreak havic on performance if it were called on every stack update. If we only supported this for newly created stacks, then it’d probably be fine. |
Not sure if protect should do both but it would be nice to have Termination Protection enabled on stacks created and the logic around it when doing a deletion. While Protect kind of works it doesn't protect us for folks outside of stacker
https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-protect-stacks.html
https://boto3.amazonaws.com/v1/documentation/api/latest/reference/services/cloudformation.html#CloudFormation.Client.create_stack
The text was updated successfully, but these errors were encountered: