Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feedback Wanted! #389

Open
ekristen opened this issue Oct 17, 2024 · 15 comments
Open

Feedback Wanted! #389

ekristen opened this issue Oct 17, 2024 · 15 comments

Comments

@ekristen
Copy link
Owner

Please provide your feedback. Here are some of the issues.

@ekristen ekristen pinned this issue Oct 17, 2024
@eaudetcobello
Copy link

eaudetcobello commented Oct 21, 2024

The feature I'm waiting for the most is being able to specify only delete resources with these tags. Right now AFAIU it's only possible to exclude resources from deletion.

For example if I have EC2Address with a tag "Name", I should be able to say... delete all EC2Address with Name == "capi-*", do not touch any other EC2Address.

My use case for this feature is Cluster API test runs that tag all the resources they create with "capi-<cluster-name>". These resources are created on a shared account, so nuking everything isn't desirable.

@ekristen
Copy link
Owner Author

@eaudetcobello I'm considering adding a feature to flip from exclusion to inclusion via #327 -- there's much to consider with adding this behavior.

@BwL1289
Copy link

BwL1289 commented Oct 22, 2024

Exclude all AWS managed IAM policies as well as resources created by CDK. Essentially, reset the AWS account to how it was at initial creation.


EDITs:

  1. Apologies, don't believe AWS managed policies can be deleted at all.
  2. I am using the awesome community template provided for AWS Control Tower and attempting to adapt it to CDK. Will provide this to the community when complete.

@ekristen
Copy link
Owner Author

@BwL1289 and @eaudetcobello you can sort of already filter for removal using Global Filters Feature combined with the invert flag, but it would only work with a single tag, with Filter Groups you could possible extend this further.

@BwL1289
Copy link

BwL1289 commented Oct 23, 2024

@ekristen a technique I'm using for CDK is:

presets:
  # Exclude cdk resources from being nuked
  cdk:
    filters:
      # Exclude resources with cdk in the name
      __global__: # Catch all for all resources
        - type: "contains"
          value: "cdk"
        - type: glob
          value: "*cdk*"
        - property: Name
          type: "glob"
          value: "*cdk*"
        - property: ARN
          type: "glob"
          value: "*cdk*"
        - property: tag:aws:cloudformation:stack-name
          value: "CDKToolkit"

Will this work as I expect? Note: I know there's a ton of redundancy here. Guidance is appreciated.

@BwL1289
Copy link

BwL1289 commented Oct 23, 2024

As I'm finalizing CDK template, two other feature requests:

  1. Filter default AWSServiceRoles and their associated IAM Policies
  2. Filter S3 Bucket Policies

@ekristen
Copy link
Owner Author

Default service roles are already filtered.

Bucket policy isn't a separate resource and I'm not sure there's an argument to make it one. Why would you want to nuke a bucket policy but not the bucket?

@BwL1289
Copy link

BwL1289 commented Oct 23, 2024

Default service roles are already filtered

Thanks. Is this in the docs? Happy to help add it if not.

Why would you want to nuke a bucket policy but not the bucket?

I wouldn't. Similar to IAMRolePolicyAttachment, I want to retain the bucket policy along with the Bucket. Looking at S3Bucket source code, this may be default behavior as well. This is likely because S3 Bucket policies aren't nameable and can't be referenced outside of the bucket. For clarity, might be worth including in the docs as well. Happy to help with this.

@nimaft
Copy link

nimaft commented Oct 23, 2024

I'm trying to nuke multiple accounts with one config file, but I cannot figure out how to specify the credentials for each account. Is it even possible? I understand I can pass multiple account name/aliases in my config file, but I dont see a way add the profile associated with those accounts. Thank you so much!

@ekristen
Copy link
Owner Author

@nimaft you can only run against a single account at a time, but you can configure as many accounts as you want in the configuration file.

@Xylon2
Copy link

Xylon2 commented Oct 28, 2024

I tried using this but it's very complicated to configure and use. I ran it one time and it seemed to delete it's own access key and didn't even delete my VPCs which was all I needed it for.

@ekristen
Copy link
Owner Author

@Xylon2 its a complex tool. It'll delete everything period, including access keys. If you want open an issue including your config and logs.

What do you fix complicated? How would it be easier?

@zack-is-cool
Copy link

It would be nice to have a clear expectation of what properties you can filter on each resource type.

Today I was attempting to exclude a CloudTrailTrail using tags. CloudTrail objects have tags. But I don't believe this tool will allow you to filter on tags? see: https://github.com/ekristen/aws-nuke/blob/main/resources/cloudtrail-trails.go#L60-L63

Please correct me if I'm wrong 😄

I'll submit an issue if you confirm we should be able to filter on this

thanks in advance @ekristen

@ekristen
Copy link
Owner Author

@zack-is-cool unfortunately not all resources support both properties and even if does not all have their tags exposed. PRs welcome! I am currently working on auto-documentation based on property data when it exists, upcoming releases will have better documentation, there is a PR in progress #391

Please feel free to open an issue for the cloud trail objects missing tags.

@jarrodallan
Copy link

I hope this is the right thread, apologies if not.

A feature I would appreciate when deleting resources, specifically CloudFormation, triggering the remove but not waiting for the delete completion. CloudFormation delete should hopefully take care of the majority of the cleanup itself but it takes a decent amount of time to delete every resource in a stack.

Perhaps a method where the delete is triggered for all stacks then each is checked once the deletes have been triggered, rather than waiting for the full deletion before starting to delete other resources.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

7 participants