A CloudFormation (or AWS CDK, etc...) stack sometimes fail to be deleted (for the status of DELETE_FAILED). For example, when the stack contains: non-empty S3 or ECR, etc...
So I have released a CLI tool in OSS that can force delete the entire AWS CloudFormation stack with just one command, even if it contains resources that fail to delete by the CloudFormation delete operation.
The name of this tool is delstack, and it is implemented in golang.(see the GitHub Link!)
Resource Types that can be forced to delete
Among the resources that fail in the normal CloudFormation stack deletion, this tool supports the following resources.
|AWS::S3::Bucket||S3 Buckets, including buckets with Non-empty or Versioning enabled and DeletionPolicy not Retain.(Because "Retain" buckets should not be deleted.)|
|AWS::IAM::Role||IAM Roles, including roles with policies from outside the stack.|
|AWS::ECR::Repository||ECR Repositories, including repositories containing images.|
|AWS::Backup::BackupVault||Backup Vaults, including vaults containing recovery points.|
|AWS::CloudFormation::Stack||Nested Child Stacks that failed to delete. If any of the other resources are included in the child stack, they too will be deleted.|
|Custom::Xxx||Custom Resources, but they will be deleted on its own.|
This tool can be used even for stacks that do not contain any of the above targets for forced deletion. So all stack deletions can basically be done with this tool!!
Rest assured! "Termination Protection" stacks will not be deleted. Because it probably really should not want to delete it.
Deletion of resources that fail to be deleted because they are used by other stack resources, i.e., resources that are referenced (depended on) from outside the stack, is not supported. Only forced deletion of resources that can be completed only within the stack is supported.
-i, --interactive option allows you to select the ResourceTypes you wish to force delete even if DELETE_FAILED. This feature allows you to protect resources you really do not want to delete by "do not select the ResourceTypes"!
However, if a resource can be deleted without becoming DELETE_FAILED by the normal CloudFormation stack deletion feature, the resource will be deleted even if you do not select that resource type. This tool is not intended to protect specific resources from the normal CloudFormation stack deletion feature, so I implemented this feature with the nuance that only those resources that really should not be deleted will not be forced to be deleted.
❯ delstack -s YourStack -i ? Select ResourceTypes you wish to delete even if DELETE_FAILED. However, if a resource can be deleted without becoming DELETE_FAILED by the normal CloudFormation stack deletion feature, the resource will be deleted even if you do not select that resource type. [Use arrows to move, space to select, <right> to all, <left> to none, type to filter] [ ] AWS::S3::Bucket [x] AWS::IAM::Role > [x] AWS::ECR::Repository [ ] AWS::Backup::BackupVault [x] AWS::CloudFormation::Stack [ ] Custom::
If you do not specify a stack name in command options in the interactive mode, you can search stack names in a case-insensitive and select a stack.
It can be empty.
❯ delstack -i Filter a keyword of stack names(case-insensitive): test-goto
Then you select stack names in the UI.
? Select StackName. [Use arrows to move, type to filter] > test-goto-stack-1 test-goto-stack-2 test-goto-stack-3 TEST-GOTO-stack-4 Test-Goto-stack-5 TEST-goto-stack-6
Please feel free to use this tool! I would be happy to help you.
Have fun with CloudFormation and CDK!
Top comments (0)