A CloudFormation (or AWS CDK, etc...) stack sometimes fail to be deleted (for the status of DELETE_FAILED). For example, when the stack contains: non-empty S3 or ECR, etc...
So I have released a CLI tool in OSS that can force delete the entire AWS CloudFormation stack with just one command, even if it contains resources that fail to delete by the CloudFormation delete operation.
The name of this tool is delstack, and it is implemented in golang.(see the GitHub Link!)
CloudFormation has a built-in force delete option (FORCE_DELETE_STACK), but it just removes the stack and leaves the failed resources behind in your account. delstack actually cleans them up. It empties S3 buckets, removes ECR images, and more, then deletes the stack cleanly with no orphaned resources.
Works with stacks created by any tool: Not just raw CloudFormation, but also stacks deployed via AWS CDK, AWS SAM, Serverless Framework, and other Infrastructure as Code tools that use CloudFormation under the hood.
Features
- Force delete undeletable resources: Automatically cleans up resources blocking deletion, such as non-empty S3 buckets, and more resource types
- Parallel deletion with dependency resolution: Deletes multiple stacks with maximum parallelism while respecting inter-stack dependencies
- Interactive stack selection: Search and select stacks in a TUI with case-insensitive filtering
-
Deletion protection handling: Detects resource-level protection (EC2, RDS, Cognito, etc.) and stack TerminationProtection. With
-f, automatically disables them before deletion - Pre-deletion optimization: Detaches Lambda VPC configurations in parallel to eliminate ENI cleanup wait time
-
Retain policy override: Force deletes resources with
RetainorRetainExceptOnCreatedeletion policies via-f - GitHub Actions support: Available as a GitHub Actions workflow for CI/CD stack cleanup
Resource Types that can be forced to delete
This tool supports force deletion of the following resource types that cause DELETE_FAILED in normal CloudFormation stack deletion. All other resources are deleted normally, so you can use this tool for any stack.
If you need support for additional resource types, please create an issue at GitHub.
| RESOURCE TYPE | DETAILS |
|---|---|
| AWS::S3::Bucket | S3 Buckets, including non-empty buckets or buckets with Versioning enabled. |
| AWS::S3Express::DirectoryBucket | S3 Directory Buckets for S3 Express One Zone, including non-empty buckets. |
| AWS::S3Tables::TableBucket | S3 Table Buckets, including buckets with any namespaces or tables. |
| AWS::S3Tables::Namespace | S3 Table Namespaces, including namespaces with any tables. |
| AWS::S3Vectors::VectorBucket | S3 Vector Buckets, including buckets with any indexes. |
| AWS::IAM::Group | IAM Groups, including groups with IAM users from outside the stack. In that case, this tool detaches the IAM users and then deletes the IAM group (but not the IAM users themselves). |
| AWS::ECR::Repository | ECR Repositories, including repositories that contain images and where the EmptyOnDelete is not true.
|
| AWS::Backup::BackupVault | Backup Vaults, including vaults containing recovery points. |
| AWS::Athena::WorkGroup | Athena WorkGroups, including workgroups containing named queries or prepared statements. |
| AWS::CloudFormation::Stack | Nested Child Stacks that failed to delete. If any of the other resources are included in the child stack, they too will be deleted. |
| AWS::CloudFormation::CustomResource | Custom Resources (AWS::CloudFormation::CustomResource), including resources that do not return a SUCCESS status. |
| Custom::Xxx | Custom Resources (Custom::Xxx), including resources that do not return a SUCCESS status. |
Note: If there are resources other than those listed above that result in DELETE_FAILED, the deletion will fail. Resources that are referenced by stacks outside the deletion targets are not supported for force deletion. However, if all dependent stacks are included in the deletion targets, they are deleted in the correct dependency order automatically.
Pre-deletion Processing
This tool automatically performs the following processing before CloudFormation deletion starts.
Deletion Protection Check
Checks for resource-level deletion protection before attempting stack deletion.
Without -f option: If any resources have deletion protection enabled, the tool reports them and aborts without attempting deletion.
With -f option: Deletion protection is automatically disabled before deletion proceeds.
| RESOURCE TYPE |
|---|
| AWS::EC2::Instance |
| AWS::RDS::DBInstance |
| AWS::RDS::DBCluster |
| AWS::Cognito::UserPool |
| AWS::Logs::LogGroup |
| AWS::ElasticLoadBalancingV2::LoadBalancer |
Performance Optimization
The following resources do not fail during normal deletion, but are optimized in advance to improve deletion speed.
| RESOURCE TYPE | DETAILS |
|---|---|
| AWS::Lambda::Function | Automatically detaches VPC configurations from Lambda functions and deletes their ENIs in parallel, eliminating ENI cleanup wait time. All Lambda functions within a stack (including nested stacks) are processed in parallel for maximum performance. |
Interactive Mode
Stack Name Selection
When using interactive mode (-i, --interactive) without specifying stack names, you can search stack names case-insensitively and select stacks.
The filter keyword can be empty.
❯ delstack -i
Filter a keyword of stack names(case-insensitive): goto
Then you select stack names in the UI.
? Select StackNames.
Nested child stacks, XXX_IN_PROGRESS(e.g. ROLLBACK_IN_PROGRESS) status stacks and EnableTerminationProtection stacks are not displayed.
[Use arrows to move, space to select, <right> to all, <left> to none, type to filter]
[x] dev-goto-04-TestStack
[ ] dev-GOTO-03-TestStack
> [x] dev-Goto-02-TestStack
[ ] dev-goto-01-TestStack
Stacks excluded from interactive selection
-
Nested child stacks: Parent stacks should generally be deleted as a whole. If you need to delete a child stack directly, specify its name with the
-soption instead of using interactive mode. -
XXX_IN_PROGRESSstacks (e.g.ROLLBACK_IN_PROGRESS): Multiple CloudFormation operations should not run on the same stack simultaneously. -
TerminationProtection stacks: Not displayed without
-f. With-f, they appear with a*prefix marker.
Force Mode
The -f, --force option enables deletion of stacks that would otherwise be blocked:
- Retain/RetainExceptOnCreate deletion policies: Resources with these policies are force deleted instead of being retained
- Resource-level deletion protection (EC2, RDS, Cognito, etc.): Protection is automatically disabled before deletion
- Stack TerminationProtection: After a confirmation prompt, protection is disabled and the stack is deleted
delstack -f -s dev-goto-01-TestStack
Large Template Handling
When using force mode with stacks that have large templates (exceeding 51,200 bytes, CloudFormation's direct template size limit), delstack automatically:
- Creates a temporary S3 bucket in your account
- Uploads the modified template to the bucket
- Updates the stack via S3 template URL
- Deletes the temporary S3 bucket after the operation completes
Parallel Stack Deletion with Automatic Dependency Resolution
When you specify multiple stacks (via the -s option or interactive mode -i), delstack automatically analyzes CloudFormation stack dependencies (via Outputs/Exports and Imports) and deletes stacks in parallel while respecting dependency constraints.
How It Works
- Dependency Analysis: Analyzes stack dependencies through CloudFormation Exports and Imports
- Circular Dependency Detection: Detects and reports circular dependencies before deletion
- External Reference Protection: Prevents deletion of stacks whose exports are used by non-target stacks
- Dynamic Parallel Deletion: Deletes stacks in dependency order with maximum parallelism
Deletion Algorithm
The deletion process uses a reverse topological sort with dynamic scheduling:
Example: Stacks A, B, C, D, E, F with dependencies:
C → A (C depends on A)
D → A
E → B
F → C, D, E
Deletion order (reverse dependencies):
Step 1: Delete F (no stacks depend on it)
Step 2: Delete C, D, E in parallel (after F completes)
Step 3: Delete B (after E completes)
Step 4: Delete A (after both C and D complete)
Key Features:
- Stacks are deleted as soon as all dependent stacks are deleted
- Multiple independent stacks are deleted in parallel
- By default, there is no limit on the number of concurrent deletions
- The
-noption allows you to limit the maximum number of concurrent deletions if needed
Error Handling
- Circular Dependencies: Detected before deletion starts, with the dependency cycle path reported
- External References: If a target stack's export is imported by a non-target stack, deletion is prevented with a detailed error message
- Partial Failures: If any stack fails to delete, all remaining deletions are cancelled
GitHub Actions
You can use delstack in GitHub Actions Workflow. To delete multiple stacks, specify stack names separated by commas.
Note: The
yesoption defaults totruein GitHub Actions because CI/CD environments cannot handle interactive prompts. Setyes: falseonly if you want the action to abort when a confirmation prompt would appear (e.g., TerminationProtection disable confirmation).
jobs:
delstack:
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v3
- name: Configure AWS credentials
uses: aws-actions/configure-aws-credentials@v3
with:
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
# Or specify access keys.
# aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
# aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
aws-region: us-east-1
- name: Delete stack
uses: go-to-k/delstack@main # Or specify the version instead of main
with:
stack-name: YourStack
# stack-name: YourStack1, YourStack2, YourStack3 # To delete multiple stacks (deleted in parallel by default)
force: true # Force Mode to delete stacks including resources with the deletion policy Retain or RetainExceptOnCreate (default: false)
# yes: true # Skip confirmation prompts (default: true in GitHub Actions)
concurrency-number: 4 # Number of parallel stack deletions (default: unlimited)
region: us-east-1
You can also run raw commands after installing the delstack binary.
jobs:
delstack:
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v3
- name: Configure AWS credentials
uses: aws-actions/configure-aws-credentials@v3
with:
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
# Or specify access keys.
# aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
# aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
aws-region: us-east-1
- name: Install delstack
uses: go-to-k/delstack@main # Or specify the version instead of main
- name: Run delstack
run: |
echo "delstack"
delstack -v
delstack -s YourStack1 -s YourStack2 -r us-east-1
Finally
Please feel free to use this tool! I would be happy to help you.
Have fun with CloudFormation and CDK!
Top comments (0)