aws
A collection of 17 posts




Terraform state locking via DynamoDB
TL;DR
Create DynamoDB table.
aws dynamodb create-table \
--table-name \
--attribute-definitions AttributeName=LockID,AttributeType=S \
--key-schema AttributeName=LockID,KeyType=HASH \
--provisioned-throughput ReadCapacityUnits=1,WriteCapacityUnits=1
Append lock_table config to backend config.
terraform {
backend "s3" {
bucket = ""
key = ""
region = "us-east-1"
+ lock_table = "


