-
Notifications
You must be signed in to change notification settings - Fork 28
Open
Labels
enhancementNew feature or requestNew feature or requestp1-importantHigh priorityHigh priorityresource-taskiterative_task TF resourceiterative_task TF resource
Description
With the current implementation, instances can't destroy all the supporting resources, because of interdependency. For example, after deleting a security group, it's impossible to issue more API calls because there is no network connection.
Possible solutions include:
-
Using cloud-native templates like AWS CloudFormation, Google Cloud Deployment
Manager and Azure Resource Templates to let providers destroy everything. -
Leaving cheap and costless resources in the cloud, and running a garbage
collector in every invocation to delete resources from past tasks. -
Requiring users to explicitly delete resources after each task. This approach
is convenient with the launch/harvest lifecycle, but not for the CML runner.
DavidGOrtega
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or requestp1-importantHigh priorityHigh priorityresource-taskiterative_task TF resourceiterative_task TF resource