We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
I want to keep secret value after stack deletion, similar to other almost all resources can.
AWS::SecretsManager::Secret-DeletionPolicy DOES NOT supports DeletionPolicy.
It would be a new option for an existing attribute is desired type of request.
new option for an existing attribute is desired
I expect AWS::SecretsManager::Secret to be exists after stack deletion, s3::Bucket or other many resources as is.
AWS::SecretsManager::Secret
Use the categories as displayed in the AWS Management Console (simplified):
The text was updated successfully, but these errors were encountered:
Creating and deleting a stack with this template works as desired in us-east-1:
us-east-1
Resources: Resource: DeletionPolicy: Retain Type: AWS::SecretsManager::Secret
Could you share that part of your template or more details on where you're experiencing this?
Sorry, something went wrong.
@PatMyron Thanks a lot. Actually, I'm using AWS-CDK.
As cdk doesn't provide this option, and cloudformation's document does not mention to DeletionPolicy, I thought it's because of cloudformation.
But, it may CDK's issue. I'll make other issue on cdk repository.
Thanks.
No branches or pull requests
I want to keep secret value after stack deletion, similar to other almost all resources can.
2. Scope of request
AWS::SecretsManager::Secret-DeletionPolicy DOES NOT supports DeletionPolicy.
It would be a
new option for an existing attribute is desired
type of request.3. Expected behavior
I expect
AWS::SecretsManager::Secret
to be exists after stack deletion, s3::Bucket or other many resources as is.6. Category (required) - Will help with tagging and be easier to find by other users to +1
Use the categories as displayed in the AWS Management Console (simplified):
The text was updated successfully, but these errors were encountered: