This repository has been archived by the owner on Oct 15, 2024. It is now read-only.
Termination protection on EC2 instances #395
Labels
kind/enhancement
New core feature or improvement of existing ones.
status/needs-proposal
It is not clear how to fix this problem and it needs further discussion.
Disabling termination protection on EC2 instances has been raised in the past (#279, #258), so I'm looking into shimming that in now.
Something I realized while working on it though is that if the tool starts to indiscriminately delete EC2 instances, termination protection or not (by disabling termination protection prior to deletion), it might be plausible that some users may have relied on the tool not deleting protected EC2 instances by now. Suddenly changing that behavior may have catastrophic consequences.
The way I'm approaching the problem now is to have
EC2Instance
be aware of whether or not it's protected, and filter itself out if it is. Easy enough to do that.However, this means that a new flag (
--override-termination-protection
?) will be introduced to force deletion, but it seems that there's no way for resources to inspect theNuke
parameters of which flags have been set at runtime. It's entirely possible that I'm just missing something here, but forcing this strategy may mean significant changes not warranted by a simple behavior change.Then again, on the other hand, the tool could just be indiscriminate about it, and just not care. Simpler, straightforward, but potentially a catastrophic change.
Thoughts?
The text was updated successfully, but these errors were encountered: