On this page

Managing Terraform State Locking in S3 Without DynamoDB

Learn when to use Terraform S3 locking without DynamoDB and when DynamoDB is still required for production. Includes architecture, risks, and best practices.

Introduction

If you’ve worked with Terraform, you’ve probably followed the standard setup:

  • S3 for storing Terraform state
  • DynamoDB for state locking

It’s widely recommended, and most teams implement it without questioning why.

But Terraform has evolved.

Today, Terraform S3 backend locking can handle state locking without DynamoDB. This introduces a simpler alternative — but also raises an important question:

Do you actually need DynamoDB for Terraform state locking anymore?

In this guide, we’ll break this down from a real-world DevOps perspective — not just configuration, but actual decision-making.


What is Terraform State Locking

Terraform state is the single source of truth for your infrastructure.

Whenever you run terraform apply, Terraform reads and updates this state file.

Without proper state locking:

  • Multiple users or pipelines can run changes at the same time
  • State files can become corrupted
  • Infrastructure becomes inconsistent

Terraform state locking ensures that only one operation modifies the state at a time.


How Terraform Locking Works

At a high level:

  1. Terraform attempts to acquire a lock
  2. If a lock exists → execution stops
  3. If no lock exists → execution proceeds
  4. After completion → lock is released

The difference is in implementation:

  • Terraform DynamoDB locking → lock stored as a database record
  • Terraform S3 backend locking → lock stored as a .tflock file

Terraform S3 Backend Architecture

In a typical Terraform S3 backend setup:

  • Terraform CLI interacts with the S3 bucket
  • Reads terraform.tfstate (state file)
  • Creates .tflock file to acquire a lock
  • Executes infrastructure changes
  • Deletes the lock after completion

This removes the dependency on DynamoDB entirely.


Terraform S3 Locking (Modern Approach)

Using Terraform S3 backend locking without DynamoDB simplifies your infrastructure.

Key Benefits

  • No additional AWS service required
  • Lower operational cost
  • Easier setup and maintenance
  • Faster onboarding for teams

For small teams and low-concurrency environments, this approach works well.


Terraform DynamoDB Locking (Traditional Approach)

The traditional setup uses DynamoDB for Terraform state locking.

Why DynamoDB Was Used

  • Strong consistency guarantees
  • Better handling of concurrent operations
  • Automatic lock management

This makes DynamoDB more reliable in complex or high-scale environments.


S3 vs DynamoDB Locking (Key Differences)

When to Use Terraform S3 Locking

Use Terraform S3 backend locking without DynamoDB if:

  • You have a small team
  • Infrastructure changes are controlled
  • CI/CD pipelines are not running in parallel
  • You want to reduce cost and complexity

This approach is ideal for startups and smaller environments.


When NOT to Use S3 Locking

Avoid S3-only locking in the following scenarios:

High Concurrency CI/CD Pipelines

Multiple pipelines running simultaneously can create conflicts.

Large Teams

More engineers increase the risk of concurrent operations.

Production-Critical Systems

Critical infrastructure requires stronger consistency guarantees.

In these cases, Terraform DynamoDB locking is the safer option.


Real-World Failure Scenario

One common issue with S3 locking occurs when Terraform crashes before releasing the lock.

What Happens

  • The .tflock file remains in S3
  • All future Terraform runs fail

Fix

aws s3 rm s3://your-bucket/path/.tflock

This manual cleanup is something every team using S3 locking should be prepared for.


Best Practices for Terraform S3 Backend

To safely use Terraform S3 backend locking, follow these best practices:

  • Enable S3 versioning to protect state
  • Use KMS encryption for security
  • Separate state files for each environment
  • Restrict IAM permissions (least privilege)
  • Monitor state access and changes

Migration from DynamoDB to S3 Locking

Migrating from DynamoDB to S3 locking is straightforward.

Step 1: Enable Locking

use_lockfile = true

Step 2: Migrate State

terraform init -migrate-state

Step 3: Validate

Test concurrency scenarios before using this setup in production.


Decision Guide

If you're unsure which approach to choose, use this simple rule:

  • Small team → S3 locking
  • Low concurrency → S3 locking
  • Large team → DynamoDB locking
  • High CI/CD activity → DynamoDB locking

FAQ

Is DynamoDB required for Terraform state locking?

No, Terraform S3 backend locking can replace DynamoDB in many cases.

Is Terraform S3 locking safe for production?

Yes for small setups, but not ideal for high-concurrency environments.

What is the biggest risk of S3 locking?

Concurrency issues and stuck .tflock files.


Read More

If you're working on Terraform and cloud automation, you might also find these useful:


Conclusion

Terraform S3 backend locking provides a simpler alternative to DynamoDB.

For small and medium setups, it reduces complexity and cost significantly.

However, for high-scale environments with frequent concurrent deployments, DynamoDB remains the more reliable option.

The key is choosing the right approach based on your workload — not blindly following defaults.