-
-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
consider: item queue revenant state #75
Comments
Hi, I definitely think this is worthwhile. Areas where it may prove useful include things like IAM Service Linked roles which can't be deleted until the consumers of the service have been. Side-note - thank you for all of your efforts thus far! |
@bdellegrazie based on the implementation from 838, correct me if I'm wrong, but a DAG based ordered deletion would solve this as well? It looks like the implementation assumes in this case that all cloud watch log groups are revenant irrespective if they actually are. I assume the goal is to make it so that multiple runs of the tool is not required, and that ordered deletion can be done. |
@ekristen to be fair I haven't looked at the implementation for a while. This is what I think is happening. I think a race condition exists, consider:
Between 2 & 3 some logs may not have been processed so because the role still exists the log groups are recreated. I suspect the correct order should be:
I think there needs to be an implicit dependency between the service linked role(s) and CloudWatch log groups. Semi-related: Side-note that I'm sure you're already aware of and the code probably already handles (I haven't checked) |
See the implementation https://github.com/rebuy-de/aws-nuke/pull/838/files
The text was updated successfully, but these errors were encountered: