Aws Cloudformation Command: Detect Stack Drift
An engineer would use the 'aws cloudformation detect-stack-drift' command when they need to verify if the resources in a specific CloudFormation stack, identified by {{stack-id}}, have diverged from the configuration defined in the stack template, particularly when managing infrastructure as code across different environments using the credentials from the specified {{profile}}. Exact CLI syntax to detect stack drift using Aws Cloudformation.
Command Syntax
aws cloudformation detect-stack-drift --stack-name <stack-id> --profile <profile> aws cloudformation detect-stack-drift --stack-name <stack-id> --profile <profile> Command Breakdown
--stack-name- Command Option
- Tool-specific option used by this command invocation.
--profile- Command Option
- Tool-specific option used by this command invocation.
FAQ
Purpose: Exact syntax to detect stack drift using Aws Cloudformation.
Test path: Replace placeholders and run destructive commands in a disposable workspace first.
Flag behavior: Tool version, platform, and shell can change behavior.
Improve This Command
Suggest a correction, safer default, or version-specific note for this entry.
Related Operations
aws cloudformation create-stack --stack-name <stack-name> --region <region> --template-body {file://path/to/file.yml} --profile <profile> Aws Cloudformation Command: List Running Stacks aws cloudformation list-stacks --stack-status-filter CREATE_COMPLETE --profile <profile> Aws Cloudformation Command: Describe Stacks aws cloudformation describe-stacks --stack-name <stack-id> --profile <profile> Aws Cloudformation Command: Delete Stack aws cloudformation delete-stack --stack-name <stack-name> --profile <profile> Aws Cloudformation Command: List Stacks aws cloudformation list-stacks --profile <profile>