Break Terraform State Lease Using Azure DevOps

In this Session, I will demonstrate how to Break Terraform State Lease Using Azure DevOps.


In Order to Protect State File from Accidental Deletion or Tampering, Direct User Access to Terraform State File is Prohibited.

While Build IaC [Infrastructure-As-Code] Using Terraform, DevOps Engineer tend to Run the Code locally by manually executing Terraform Init, Plan and Apply Commands respectively.

During this whole Process, there might be Situation, where the Terraform State file is in Locked State and Unless the Lock is released, the code cannot be executed anymore (Manually or using Az DevOps Pipeline).

This is where, the below Az DevOps Pipeline helps.

The Az DevOps Pipeline runs in the Build Agent using Az DevOps Service Connection which is Az Service Principal Credentials behind the Scene with Appropriate RBAC [Role Based Access Control] on Subscription or Resource Group Level.

For more details, please refer my blog:-

Arindam Mitra

Microsoft MVP in Developer Technologies | Azure Cloud Solutions & DevOps Architect | Technical Blogger | Speaker | Traveler | Citizen of the World

Zürich, Switzerland


Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top