-
-
Notifications
You must be signed in to change notification settings - Fork 4.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CloudWatch LogGroup not destroyed #435
Comments
Hi, The IAM policy is for AWS Service "vpc-flow-logs.amazonaws.com" and that service needs to have permissions to create log groups and log streams. Or I didn't understand what you mean? |
Hi, No this is not needed as the log group is created while deploying the module in the following resource
|
I see, and I think you are right - |
Yes exactly |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Hello,
To reproduce this you can create a VPC with thoses inputs
This will create VPC, enable flow log and create log group as expected.
Then destroy it.
The log group is not destroyed.
However the destroy command succeded.
In reality the log group is destroyed when we issued the destroy command...but as the IAM policy contains
logs:CreateLogGroup
so when a flow log is logged, it will create the log group again.Do we really need that policy ? In my opinion no as the one who will apply this module has enough permission to create it.
The text was updated successfully, but these errors were encountered: