DEV Community

Cover image for Managing Terraform State Locking in S3 Without DytnamoDB
sanjay yadav
sanjay yadav

Posted on

Managing Terraform State Locking in S3 Without DytnamoDB

Introduction

If you’ve worked with Terraform, you’ve probably followed the standard setup:

S3 for storing Terraform state
DynamoDB for state locking
It’s widely recommended, and most teams implement it without questioning why.

But Terraform has evolved.

Today, Terraform S3 backend locking can handle state locking without DynamoDB. This introduces a simpler alternative — but also raises an important question:

Do you actually need DynamoDB for Terraform state locking anymore?
In this guide, we’ll break this down from a real-world DevOps perspective — not just configuration, but actual decision-making.

What is Terraform State Locking

Terraform state is the single source of truth for your infrastructure.

Whenever you run terraform apply, Terraform reads and updates this state file.

Without proper state locking:

Multiple users or pipelines can run changes at the same time
State files can become corrupted
Infrastructure becomes inconsistent
Terraform state locking ensures that only one operation modifies the state at a time.

How Terraform Locking Works

At a high level:

  1. Terraform attempts to acquire a lock
  2. If a lock exists → execution stops
  3. If no lock exists → execution proceeds
  4. After completion → lock is released

The difference is in implementation:

Terraform DynamoDB locking

→ lock stored as a database record

Terraform S3 backend locking

→ lock stored as a .tflock file

Terraform S3 Backend Architecture

In a typical Terraform S3 backend setup:

Terraform CLI interacts with the S3 bucket
Reads terraform.tfstate (state file)
Creates .tflock file to acquire a lock
Executes infrastructure changes
Deletes the lock after completion
This removes the dependency on DynamoDB entirely.

Terraform S3 Locking (Modern Approach)

Using Terraform S3 backend locking without DynamoDB simplifies your infrastructure.

Key Benefits

No additional AWS service required
Lower operational cost
Easier setup and maintenance
Faster onboarding for teams
For small teams and low-concurrency environments, this approach works well.

Terraform DynamoDB Locking (Traditional Approach)

The traditional setup uses DynamoDB for Terraform state locking.

Why DynamoDB Was Used

Strong consistency guarantees
Better handling of concurrent operations
Automatic lock management
This makes DynamoDB more reliable in complex or high-scale environments.

S3 vs DynamoDB Locking (Key Differences)

When to Use Terraform S3 Locking

Use Terraform S3 backend locking without DynamoDB if:

  • You have a small team
  • Infrastructure changes are controlled
  • CI/CD pipelines are not running in parallel
  • You want to reduce cost and complexity This approach is ideal for startups and smaller environments.

When NOT to Use S3 Locking

Avoid S3-only locking in the following scenarios:

High Concurrency CI/CD Pipelines

Multiple pipelines running simultaneously can create conflicts.

Large Teams

More engineers increase the risk of concurrent operations.

Production-Critical Systems

Critical infrastructure requires stronger consistency guarantees.

In these cases, Terraform DynamoDB locking is the safer option.

Real-World Failure Scenario

One common issue with S3 locking occurs when Terraform crashes before releasing the lock.

What Happens

The .tflock file remains in S3
All future Terraform runs fail

Fix

aws s3 rm s3://your-bucket/path/.tflock
Enter fullscreen mode Exit fullscreen mode

This manual cleanup is something every team using S3 locking should be prepared for.

Best Practices for Terraform S3 Backend

To safely use Terraform S3 backend locking, follow these best practices:

  • Enable S3 versioning to protect state
  • Use KMS encryption for security
  • Separate state files for each environment
  • Restrict IAM permissions (least privilege)
  • Monitor state access and changes

Migration from DynamoDB to S3 Locking

Migrating from DynamoDB to S3 locking is straightforward.

Step 1: Enable Locking

use_lockfile = true

Step 2: Migrate State

terraform init -migrate-state

Step 3: Validate

Test concurrency scenarios before using this setup in production.

Decision Guide

If you're unsure which approach to choose, use this simple rule:

Small team → S3 locking
Low concurrency → S3 locking
Large team → DynamoDB locking
High CI/CD activity → DynamoDB locking

FAQ

Is DynamoDB required for Terraform state locking?

No, Terraform S3 backend locking can replace DynamoDB in many cases.

Is Terraform S3 locking safe for production?

Yes for small setups, but not ideal for high-concurrency environments.

What is the biggest risk of S3 locking?

Concurrency issues and stuck .tflock files.

Read More

If you're working on Terraform and cloud automation, you might also find these useful:

https://www.kubeblogs.com/gcp-billing-kill-switch-with-terraform/
https://www.kubeblogs.com/fluent-bit-vs-grafana-alloy/
https://www.kubeblogs.com/how-civo-kubernetes-routes-pod-traffic/

Conclusion

Terraform S3 backend locking provides a simpler alternative to DynamoDB.

For small and medium setups, it reduces complexity and cost significantly.

However, for high-scale environments with frequent concurrent deployments, DynamoDB remains the more reliable option.

The key is choosing the right approach based on your workload — not blindly following defaults.

Top comments (0)