Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DeletePolicy Protection for Secrets and Keys #182

Open
ChrisPates opened this issue Mar 22, 2024 · 0 comments
Open

DeletePolicy Protection for Secrets and Keys #182

ChrisPates opened this issue Mar 22, 2024 · 0 comments
Labels
enhancement New feature or request
Milestone

Comments

@ChrisPates
Copy link
Contributor

ChrisPates commented Mar 22, 2024

Is your feature request related to a problem? Please describe.
Currently the Secrets and Keys, created by the template for SSOSync have the default DeletionPolicy of Delete, but this risks loosing these secrets or access to the secrets when switch a deployment between one that contains secrets and one that does not.

Describe the solution you'd like

  • Improve Guidance, for switching from the classic deployment single stack pattern to any of the split stack options.
  • Add a Parameter for DeletionPolicy so end user can make their own choice, with a default value of RetainExceptOnCreate.

Describe alternatives you've considered
Simply configuring DeletionPolicy to Retain or RetainExceptOnCreate would address this is you but then disrupt automated deployments as the retained resources would need to be cleaned up manual or manually import into a new stack.

Additional context
Issue was highlighted by Leny1996 in issue #181

@ChrisPates ChrisPates added the enhancement New feature or request label Mar 22, 2024
@ChrisPates ChrisPates added this to the v2.3 milestone Mar 22, 2024
@ChrisPates ChrisPates changed the title DeltePolicy Protection for Secrets and Keys DeletePolicy Protection for Secrets and Keys Mar 26, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant