aws-secretsmanager
Verified for current stable LTS
Aws Secretsmanager Command: Delete Secret Force
An engineer would use the 'aws secretsmanager delete-secret --secret-id {{name|arn}} --force-delete-without-recovery' command when they need to permanently delete a secret from AWS Secrets Manager without the option for recovery, typically during a secure application decommissioning process. Exact CLI syntax to delete secret force using Aws Secretsmanager.
When to use this: An engineer would use the 'aws secretsmanager delete-secret --secret-id {{name|arn}} --force-delete-without-recovery' command when they need to permanently delete a secret from AWS Secrets Manager without the option for recovery, typically during a secure application decommissioning process.
Destructive Command Warning
Destructive operation. Confirm the target path and keep a backup before executing.
Command Syntax
aws secretsmanager delete-secret --secret-id <name|arn> --force-delete-without-recovery aws secretsmanager delete-secret --secret-id <name|arn> --force-delete-without-recovery Command Breakdown
--secret-id- Command Option
- Tool-specific option used by this command invocation.
--force-delete-without-recovery- Command Option
- Tool-specific option used by this command invocation.
FAQ
Purpose: Exact syntax to delete secret force using Aws Secretsmanager.
Test path: Replace placeholders and run destructive commands in a disposable workspace first.
Flag behavior: Tool version, platform, and shell can change behavior.
Improve This Command
Suggest a correction, safer default, or version-specific note for this entry.
Related Operations
Aws Secretsmanager Command: List Secrets
aws secretsmanager list-secrets Aws Secretsmanager Command: Delete Secret aws secretsmanager delete-secret --secret-id <name|arn> Aws Secretsmanager Command: Describe Secret aws secretsmanager describe-secret --secret-id <name|arn> Aws Secretsmanager Command: Rotate Secret Auto aws secretsmanager rotate-secret --secret-id <name|arn> --rotation-lambda-arn <arn_of_lambda_function> --rotation-rules AutomaticallyAfterDays=<30> Aws Secretsmanager Command: List Secrets Query aws secretsmanager list-secrets --query 'SecretList[*].{Name: Name, ARN: ARN}'