From 3eb2da7469a49a53f4481606b3d897551fd76bcc Mon Sep 17 00:00:00 2001 From: Isaac Behrens Date: Wed, 30 Apr 2025 16:20:21 -0500 Subject: [PATCH 1/2] Move from deprecated Terraform backend locking using `dynamodb_table = "###TF_S3_BACKEND_NAME###-lock"` to `use_lockfile = true` which is required in Terraform 1.11.4+. --- iac/roots/athena/backend.tf | 10 +++++----- iac/roots/datalakes/billing-cur/backend.tf | 10 +++++----- iac/roots/datalakes/billing/backend.tf | 10 +++++----- iac/roots/datalakes/inventory/backend.tf | 10 +++++----- iac/roots/datalakes/splunk/backend.tf | 10 +++++----- iac/roots/datazone/dz-consumer-project/backend.tf | 10 +++++----- iac/roots/datazone/dz-custom-project/backend.tf | 10 +++++----- iac/roots/datazone/dz-domain/backend.tf | 10 +++++----- iac/roots/datazone/dz-producer-project/backend.tf | 10 +++++----- iac/roots/datazone/dz-project-prereq/backend.tf | 10 +++++----- iac/roots/foundation/buckets/backend.tf | 10 +++++----- iac/roots/foundation/iam-roles/backend.tf | 10 +++++----- iac/roots/foundation/kms-keys/backend.tf | 10 +++++----- iac/roots/idc/idc-acc/backend.tf | 10 +++++----- iac/roots/idc/idc-org/backend.tf | 10 +++++----- iac/roots/network/backend.tf | 10 +++++----- iac/roots/quicksight/dataset/backend.tf | 10 +++++----- iac/roots/quicksight/subscription/backend.tf | 10 +++++----- iac/roots/sagemaker/consumer-project/backend.tf | 10 +++++----- iac/roots/sagemaker/domain-prereq/backend.tf | 10 +++++----- iac/roots/sagemaker/domain/backend.tf | 10 +++++----- iac/roots/sagemaker/producer-project/backend.tf | 10 +++++----- iac/roots/sagemaker/project-config/backend.tf | 10 +++++----- iac/roots/sagemaker/project-prereq/backend.tf | 10 +++++----- iac/roots/sagemaker/project-user/backend.tf | 10 +++++----- 25 files changed, 125 insertions(+), 125 deletions(-) diff --git a/iac/roots/athena/backend.tf b/iac/roots/athena/backend.tf index 2733b8f..1800e33 100644 --- a/iac/roots/athena/backend.tf +++ b/iac/roots/athena/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/athena/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/athena/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datalakes/billing-cur/backend.tf b/iac/roots/datalakes/billing-cur/backend.tf index 53a7540..4650ec3 100644 --- a/iac/roots/datalakes/billing-cur/backend.tf +++ b/iac/roots/datalakes/billing-cur/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/billing-cur/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/billing-cur/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datalakes/billing/backend.tf b/iac/roots/datalakes/billing/backend.tf index ef4a5cf..8bd0f02 100644 --- a/iac/roots/datalakes/billing/backend.tf +++ b/iac/roots/datalakes/billing/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/billing/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/billing/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datalakes/inventory/backend.tf b/iac/roots/datalakes/inventory/backend.tf index b311043..937f454 100644 --- a/iac/roots/datalakes/inventory/backend.tf +++ b/iac/roots/datalakes/inventory/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/inventory/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/inventory/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datalakes/splunk/backend.tf b/iac/roots/datalakes/splunk/backend.tf index b8cc3ee..5cdbd47 100644 --- a/iac/roots/datalakes/splunk/backend.tf +++ b/iac/roots/datalakes/splunk/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/splunk/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/splunk/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datazone/dz-consumer-project/backend.tf b/iac/roots/datazone/dz-consumer-project/backend.tf index b5ee94b..9b300e4 100644 --- a/iac/roots/datazone/dz-consumer-project/backend.tf +++ b/iac/roots/datazone/dz-consumer-project/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/dz-consumer-project/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/dz-consumer-project/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datazone/dz-custom-project/backend.tf b/iac/roots/datazone/dz-custom-project/backend.tf index 55ee571..25cd941 100644 --- a/iac/roots/datazone/dz-custom-project/backend.tf +++ b/iac/roots/datazone/dz-custom-project/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/dz-custom-project/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/dz-custom-project/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datazone/dz-domain/backend.tf b/iac/roots/datazone/dz-domain/backend.tf index bc760d7..706b7ff 100644 --- a/iac/roots/datazone/dz-domain/backend.tf +++ b/iac/roots/datazone/dz-domain/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/dz-domain/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/dz-domain/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datazone/dz-producer-project/backend.tf b/iac/roots/datazone/dz-producer-project/backend.tf index fb0777d..cae1de6 100644 --- a/iac/roots/datazone/dz-producer-project/backend.tf +++ b/iac/roots/datazone/dz-producer-project/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/dz-producer-project/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/dz-producer-project/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datazone/dz-project-prereq/backend.tf b/iac/roots/datazone/dz-project-prereq/backend.tf index f0330d2..90a1bc1 100644 --- a/iac/roots/datazone/dz-project-prereq/backend.tf +++ b/iac/roots/datazone/dz-project-prereq/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/dz-project-prereq/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/dz-project-prereq/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/foundation/buckets/backend.tf b/iac/roots/foundation/buckets/backend.tf index b98f059..db0941a 100644 --- a/iac/roots/foundation/buckets/backend.tf +++ b/iac/roots/foundation/buckets/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/buckets/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/buckets/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/foundation/iam-roles/backend.tf b/iac/roots/foundation/iam-roles/backend.tf index 71e6c63..3082ae3 100644 --- a/iac/roots/foundation/iam-roles/backend.tf +++ b/iac/roots/foundation/iam-roles/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/iam-roles/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/iam-roles/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/foundation/kms-keys/backend.tf b/iac/roots/foundation/kms-keys/backend.tf index 3eb219d..52c048d 100644 --- a/iac/roots/foundation/kms-keys/backend.tf +++ b/iac/roots/foundation/kms-keys/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/kms-keys/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/kms-keys/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/idc/idc-acc/backend.tf b/iac/roots/idc/idc-acc/backend.tf index d2fdc69..071ef63 100644 --- a/iac/roots/idc/idc-acc/backend.tf +++ b/iac/roots/idc/idc-acc/backend.tf @@ -3,10 +3,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/idc-acc/terraform.tfstate" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/idc-acc/terraform.tfstate" + encrypt = true } } diff --git a/iac/roots/idc/idc-org/backend.tf b/iac/roots/idc/idc-org/backend.tf index 2b16dbc..15a22a4 100644 --- a/iac/roots/idc/idc-org/backend.tf +++ b/iac/roots/idc/idc-org/backend.tf @@ -3,10 +3,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/idc-org/terraform.tfstate" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/idc-org/terraform.tfstate" + encrypt = true } } diff --git a/iac/roots/network/backend.tf b/iac/roots/network/backend.tf index 1164b32..fdb24a5 100644 --- a/iac/roots/network/backend.tf +++ b/iac/roots/network/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/network/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/network/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/quicksight/dataset/backend.tf b/iac/roots/quicksight/dataset/backend.tf index 486d31d..a675a07 100644 --- a/iac/roots/quicksight/dataset/backend.tf +++ b/iac/roots/quicksight/dataset/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/dataset/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/dataset/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/quicksight/subscription/backend.tf b/iac/roots/quicksight/subscription/backend.tf index c0783af..e9c0b82 100644 --- a/iac/roots/quicksight/subscription/backend.tf +++ b/iac/roots/quicksight/subscription/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/subscription/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/subscription/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/consumer-project/backend.tf b/iac/roots/sagemaker/consumer-project/backend.tf index aa5012f..0146f58 100644 --- a/iac/roots/sagemaker/consumer-project/backend.tf +++ b/iac/roots/sagemaker/consumer-project/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/consumer-project/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/consumer-project/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/domain-prereq/backend.tf b/iac/roots/sagemaker/domain-prereq/backend.tf index b1d73dd..d87cae2 100644 --- a/iac/roots/sagemaker/domain-prereq/backend.tf +++ b/iac/roots/sagemaker/domain-prereq/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/domain-prereq/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/domain-prereq/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/domain/backend.tf b/iac/roots/sagemaker/domain/backend.tf index 5d22289..3658887 100644 --- a/iac/roots/sagemaker/domain/backend.tf +++ b/iac/roots/sagemaker/domain/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/domain/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/domain/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/producer-project/backend.tf b/iac/roots/sagemaker/producer-project/backend.tf index e3b807b..b1e4006 100644 --- a/iac/roots/sagemaker/producer-project/backend.tf +++ b/iac/roots/sagemaker/producer-project/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/producer-project/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/producer-project/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/project-config/backend.tf b/iac/roots/sagemaker/project-config/backend.tf index e06a3ee..1bf8488 100644 --- a/iac/roots/sagemaker/project-config/backend.tf +++ b/iac/roots/sagemaker/project-config/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/project-config/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/project-config/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/project-prereq/backend.tf b/iac/roots/sagemaker/project-prereq/backend.tf index 0475f81..8b488a8 100644 --- a/iac/roots/sagemaker/project-prereq/backend.tf +++ b/iac/roots/sagemaker/project-prereq/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/project-prereq/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/project-prereq/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/project-user/backend.tf b/iac/roots/sagemaker/project-user/backend.tf index cd7f8c5..9cf5766 100644 --- a/iac/roots/sagemaker/project-user/backend.tf +++ b/iac/roots/sagemaker/project-user/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" - key = "###ENV_NAME###/project-user/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_DEFAULT_REGION###" + key = "###ENV_NAME###/project-user/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } From b70b2055f31fb0c2718e3484f53bd8155bc75b5d Mon Sep 17 00:00:00 2001 From: Isaac Behrens Date: Fri, 2 May 2025 15:15:44 -0500 Subject: [PATCH 2/2] Move from deprecated Terraform backend locking using `dynamodb_table = "###TF_S3_BACKEND_NAME###-lock"` to `use_lockfile = true` which is required in Terraform 1.11.4+. --- iac/roots/athena/backend.tf | 10 +++++----- iac/roots/datalakes/billing-cur/backend.tf | 10 +++++----- iac/roots/datalakes/billing/backend.tf | 10 +++++----- iac/roots/datalakes/inventory/backend.tf | 10 +++++----- iac/roots/datalakes/splunk/backend.tf | 10 +++++----- iac/roots/datazone/dz-consumer-project/backend.tf | 10 +++++----- iac/roots/datazone/dz-custom-project/backend.tf | 10 +++++----- iac/roots/datazone/dz-domain/backend.tf | 10 +++++----- iac/roots/datazone/dz-producer-project/backend.tf | 10 +++++----- iac/roots/datazone/dz-project-prereq/backend.tf | 10 +++++----- iac/roots/foundation/buckets/backend.tf | 10 +++++----- iac/roots/foundation/iam-roles/backend.tf | 10 +++++----- iac/roots/foundation/kms-keys/backend.tf | 10 +++++----- iac/roots/idc/idc-acc/backend.tf | 10 +++++----- iac/roots/idc/idc-org/backend.tf | 10 +++++----- iac/roots/network/backend.tf | 10 +++++----- iac/roots/quicksight/dataset/backend.tf | 10 +++++----- iac/roots/quicksight/subscription/backend.tf | 10 +++++----- iac/roots/sagemaker/consumer-project/backend.tf | 10 +++++----- iac/roots/sagemaker/domain-prereq/backend.tf | 10 +++++----- iac/roots/sagemaker/domain/backend.tf | 10 +++++----- iac/roots/sagemaker/producer-project/backend.tf | 10 +++++----- iac/roots/sagemaker/project-config/backend.tf | 10 +++++----- iac/roots/sagemaker/project-prereq/backend.tf | 10 +++++----- iac/roots/sagemaker/project-user/backend.tf | 10 +++++----- 25 files changed, 125 insertions(+), 125 deletions(-) diff --git a/iac/roots/athena/backend.tf b/iac/roots/athena/backend.tf index de10cb0..0ab8985 100644 --- a/iac/roots/athena/backend.tf +++ b/iac/roots/athena/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/athena/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/athena/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datalakes/billing-cur/backend.tf b/iac/roots/datalakes/billing-cur/backend.tf index d699695..4a058db 100644 --- a/iac/roots/datalakes/billing-cur/backend.tf +++ b/iac/roots/datalakes/billing-cur/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/billing-cur/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/billing-cur/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datalakes/billing/backend.tf b/iac/roots/datalakes/billing/backend.tf index e09b5a8..e40988a 100644 --- a/iac/roots/datalakes/billing/backend.tf +++ b/iac/roots/datalakes/billing/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/billing/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/billing/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datalakes/inventory/backend.tf b/iac/roots/datalakes/inventory/backend.tf index 6ea1399..a4fa74e 100644 --- a/iac/roots/datalakes/inventory/backend.tf +++ b/iac/roots/datalakes/inventory/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/inventory/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/inventory/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datalakes/splunk/backend.tf b/iac/roots/datalakes/splunk/backend.tf index dd7198a..fc94d1e 100644 --- a/iac/roots/datalakes/splunk/backend.tf +++ b/iac/roots/datalakes/splunk/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/splunk/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/splunk/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datazone/dz-consumer-project/backend.tf b/iac/roots/datazone/dz-consumer-project/backend.tf index e657ede..217105f 100644 --- a/iac/roots/datazone/dz-consumer-project/backend.tf +++ b/iac/roots/datazone/dz-consumer-project/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/dz-consumer-project/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/dz-consumer-project/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datazone/dz-custom-project/backend.tf b/iac/roots/datazone/dz-custom-project/backend.tf index 9eec9dc..ac363b0 100644 --- a/iac/roots/datazone/dz-custom-project/backend.tf +++ b/iac/roots/datazone/dz-custom-project/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/dz-custom-project/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/dz-custom-project/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datazone/dz-domain/backend.tf b/iac/roots/datazone/dz-domain/backend.tf index 6763f0b..44cca14 100644 --- a/iac/roots/datazone/dz-domain/backend.tf +++ b/iac/roots/datazone/dz-domain/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/dz-domain/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/dz-domain/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datazone/dz-producer-project/backend.tf b/iac/roots/datazone/dz-producer-project/backend.tf index 44e33f3..8022ad6 100644 --- a/iac/roots/datazone/dz-producer-project/backend.tf +++ b/iac/roots/datazone/dz-producer-project/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/dz-producer-project/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/dz-producer-project/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/datazone/dz-project-prereq/backend.tf b/iac/roots/datazone/dz-project-prereq/backend.tf index 8540f85..55cc8b6 100644 --- a/iac/roots/datazone/dz-project-prereq/backend.tf +++ b/iac/roots/datazone/dz-project-prereq/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/dz-project-prereq/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/dz-project-prereq/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/foundation/buckets/backend.tf b/iac/roots/foundation/buckets/backend.tf index f5a060c..5008f2a 100644 --- a/iac/roots/foundation/buckets/backend.tf +++ b/iac/roots/foundation/buckets/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/buckets/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/buckets/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/foundation/iam-roles/backend.tf b/iac/roots/foundation/iam-roles/backend.tf index 5cddb38..0e83e17 100644 --- a/iac/roots/foundation/iam-roles/backend.tf +++ b/iac/roots/foundation/iam-roles/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/iam-roles/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/iam-roles/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/foundation/kms-keys/backend.tf b/iac/roots/foundation/kms-keys/backend.tf index 09850e9..64ad119 100644 --- a/iac/roots/foundation/kms-keys/backend.tf +++ b/iac/roots/foundation/kms-keys/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/kms-keys/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/kms-keys/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/idc/idc-acc/backend.tf b/iac/roots/idc/idc-acc/backend.tf index bbe0604..042d5b7 100644 --- a/iac/roots/idc/idc-acc/backend.tf +++ b/iac/roots/idc/idc-acc/backend.tf @@ -3,10 +3,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/idc-acc/terraform.tfstate" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/idc-acc/terraform.tfstate" + encrypt = true } } diff --git a/iac/roots/idc/idc-org/backend.tf b/iac/roots/idc/idc-org/backend.tf index a55bbce..a1b251e 100644 --- a/iac/roots/idc/idc-org/backend.tf +++ b/iac/roots/idc/idc-org/backend.tf @@ -3,10 +3,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/idc-org/terraform.tfstate" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/idc-org/terraform.tfstate" + encrypt = true } } diff --git a/iac/roots/network/backend.tf b/iac/roots/network/backend.tf index 5347af2..1c5ca94 100644 --- a/iac/roots/network/backend.tf +++ b/iac/roots/network/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/network/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/network/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/quicksight/dataset/backend.tf b/iac/roots/quicksight/dataset/backend.tf index 03479c0..5dcdc24 100644 --- a/iac/roots/quicksight/dataset/backend.tf +++ b/iac/roots/quicksight/dataset/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/dataset/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/dataset/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/quicksight/subscription/backend.tf b/iac/roots/quicksight/subscription/backend.tf index 0c143b6..3a0f2e2 100644 --- a/iac/roots/quicksight/subscription/backend.tf +++ b/iac/roots/quicksight/subscription/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/subscription/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/subscription/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/consumer-project/backend.tf b/iac/roots/sagemaker/consumer-project/backend.tf index fb1a7c1..54d3fea 100644 --- a/iac/roots/sagemaker/consumer-project/backend.tf +++ b/iac/roots/sagemaker/consumer-project/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/consumer-project/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/consumer-project/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/domain-prereq/backend.tf b/iac/roots/sagemaker/domain-prereq/backend.tf index b3e796a..f9ae286 100644 --- a/iac/roots/sagemaker/domain-prereq/backend.tf +++ b/iac/roots/sagemaker/domain-prereq/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/domain-prereq/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/domain-prereq/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/domain/backend.tf b/iac/roots/sagemaker/domain/backend.tf index a09dbbc..b610a23 100644 --- a/iac/roots/sagemaker/domain/backend.tf +++ b/iac/roots/sagemaker/domain/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/domain/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/domain/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/producer-project/backend.tf b/iac/roots/sagemaker/producer-project/backend.tf index 6334e71..9240ad2 100644 --- a/iac/roots/sagemaker/producer-project/backend.tf +++ b/iac/roots/sagemaker/producer-project/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/producer-project/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/producer-project/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/project-config/backend.tf b/iac/roots/sagemaker/project-config/backend.tf index 7a37293..011278e 100644 --- a/iac/roots/sagemaker/project-config/backend.tf +++ b/iac/roots/sagemaker/project-config/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/project-config/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/project-config/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/project-prereq/backend.tf b/iac/roots/sagemaker/project-prereq/backend.tf index 87df811..f670939 100644 --- a/iac/roots/sagemaker/project-prereq/backend.tf +++ b/iac/roots/sagemaker/project-prereq/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/project-prereq/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/project-prereq/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } } diff --git a/iac/roots/sagemaker/project-user/backend.tf b/iac/roots/sagemaker/project-user/backend.tf index d3d9e38..8d3656f 100644 --- a/iac/roots/sagemaker/project-user/backend.tf +++ b/iac/roots/sagemaker/project-user/backend.tf @@ -5,10 +5,10 @@ terraform { backend "s3" { - bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" - key = "###ENV_NAME###/project-user/terraform.tfstate" - dynamodb_table = "###TF_S3_BACKEND_NAME###-lock" - region = "###AWS_PRIMARY_REGION###" - encrypt = true + bucket = "###TF_S3_BACKEND_NAME###-###AWS_ACCOUNT_ID###-###AWS_PRIMARY_REGION###" + key = "###ENV_NAME###/project-user/terraform.tfstate" + use_lockfile = true + region = "###AWS_PRIMARY_REGION###" + encrypt = true } }