Introduction
If you’ve worked with Terraform, you’ve probably followed the standard setup:
S3 for storing Terraform state
DynamoDB for state locking
It’s widely recommended, and most teams implement it without questioning why.
But Terraform has evolved.
Today, Terraform S3 backend locking can handle state locking without DynamoDB. This introduces a simpler alternative — but also raises an important question:
Do you actually need DynamoDB for Terraform state locking anymore?
In this guide, we’ll break this down from a real-world DevOps perspective — not just configuration, but actual decision-making.
What is Terraform State Locking
Terraform state is the single source of truth for your infrastructure.
Whenever you run terraform apply, Terraform reads and updates this state file.
Without proper state locking:
Multiple users or pipelines can run changes at the same time
State files can become corrupted
Infrastructure becomes inconsistent
Terraform state locking ensures that only one operation modifies the state at a time.
How Terraform Locking Works
At a high level:
- Terraform attempts to acquire a lock
- If a lock exists → execution stops
- If no lock exists → execution proceeds
- After completion → lock is released
The difference is in implementation:
Terraform DynamoDB locking
→ lock stored as a database record
Terraform S3 backend locking
→ lock stored as a .tflock file
Terraform S3 Backend Architecture
In a typical Terraform S3 backend setup:
Terraform CLI interacts with the S3 bucket
Reads terraform.tfstate (state file)
Creates .tflock file to acquire a lock
Executes infrastructure changes
Deletes the lock after completion
This removes the dependency on DynamoDB entirely.
Terraform S3 Locking (Modern Approach)
Using Terraform S3 backend locking without DynamoDB simplifies your infrastructure.
Key Benefits
No additional AWS service required
Lower operational cost
Easier setup and maintenance
Faster onboarding for teams
For small teams and low-concurrency environments, this approach works well.
Terraform DynamoDB Locking (Traditional Approach)
The traditional setup uses DynamoDB for Terraform state locking.
Why DynamoDB Was Used
Strong consistency guarantees
Better handling of concurrent operations
Automatic lock management
This makes DynamoDB more reliable in complex or high-scale environments.
S3 vs DynamoDB Locking (Key Differences)
When to Use Terraform S3 Locking
Use Terraform S3 backend locking without DynamoDB if:
- You have a small team
- Infrastructure changes are controlled
- CI/CD pipelines are not running in parallel
- You want to reduce cost and complexity This approach is ideal for startups and smaller environments.
When NOT to Use S3 Locking
Avoid S3-only locking in the following scenarios:
High Concurrency CI/CD Pipelines
Multiple pipelines running simultaneously can create conflicts.
Large Teams
More engineers increase the risk of concurrent operations.
Production-Critical Systems
Critical infrastructure requires stronger consistency guarantees.
In these cases, Terraform DynamoDB locking is the safer option.
Real-World Failure Scenario
One common issue with S3 locking occurs when Terraform crashes before releasing the lock.
What Happens
The .tflock file remains in S3
All future Terraform runs fail
Fix
aws s3 rm s3://your-bucket/path/.tflock
This manual cleanup is something every team using S3 locking should be prepared for.
Best Practices for Terraform S3 Backend
To safely use Terraform S3 backend locking, follow these best practices:
- Enable S3 versioning to protect state
- Use KMS encryption for security
- Separate state files for each environment
- Restrict IAM permissions (least privilege)
- Monitor state access and changes
Migration from DynamoDB to S3 Locking
Migrating from DynamoDB to S3 locking is straightforward.
Step 1: Enable Locking
use_lockfile = true
Step 2: Migrate State
terraform init -migrate-state
Step 3: Validate
Test concurrency scenarios before using this setup in production.
Decision Guide
If you're unsure which approach to choose, use this simple rule:
Small team → S3 locking
Low concurrency → S3 locking
Large team → DynamoDB locking
High CI/CD activity → DynamoDB locking
FAQ
Is DynamoDB required for Terraform state locking?
No, Terraform S3 backend locking can replace DynamoDB in many cases.
Is Terraform S3 locking safe for production?
Yes for small setups, but not ideal for high-concurrency environments.
What is the biggest risk of S3 locking?
Concurrency issues and stuck .tflock files.
Read More
If you're working on Terraform and cloud automation, you might also find these useful:
https://www.kubeblogs.com/gcp-billing-kill-switch-with-terraform/
https://www.kubeblogs.com/fluent-bit-vs-grafana-alloy/
https://www.kubeblogs.com/how-civo-kubernetes-routes-pod-traffic/
Conclusion
Terraform S3 backend locking provides a simpler alternative to DynamoDB.
For small and medium setups, it reduces complexity and cost significantly.
However, for high-scale environments with frequent concurrent deployments, DynamoDB remains the more reliable option.
The key is choosing the right approach based on your workload — not blindly following defaults.


Top comments (0)