Skip to content

Commit ac9cce9

Browse files
author
saksham.ratra
committed
1. Updated the GCS Configuration To make more sense related to HNS
2. Corrected one broken link in "Polaris Configurtion Page"
1 parent 368c103 commit ac9cce9

File tree

2 files changed

+6
-11
lines changed

2 files changed

+6
-11
lines changed

site/content/in-dev/unreleased/configuring-polaris-for-production/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ Depending on your database, this may not be convenient as the generated credenti
173173
in clear text in the database.
174174

175175
In order to provide your own credentials for `root` principal (so you can request tokens via
176-
`api/catalog/v1/oauth/tokens`), use the [Polaris Admin Tool]({{% ref "admin-tool" %}})
176+
`api/catalog/v1/oauth/tokens`), use the [Polaris Admin Tool](../../../../docs/admin-tool.md)
177177

178178
You can verify the setup by attempting a token issue for the `root` principal:
179179

site/content/in-dev/unreleased/configuring-polaris-for-production/configuring-gcs-cloud-storage-specific.md

Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -23,15 +23,10 @@ type: docs
2323
weight: 600
2424
---
2525

26-
This page provides guidance for Configuring GCS Cloud Storage provider for use with Polaris.
27-
It covers credential vending, IAM roles, ACL requirements, and best practices to ensure secure and reliable integration.
26+
This page provides guidance for configuring GCS Cloud Storage provider for use with Polaris. It covers credential vending, IAM roles, ACL requirements, and best practices to ensure secure and reliable integration.
2827

29-
#### GCS
28+
All catalog operations in Polaris for Google Cloud Storage (GCS)—including listing, reading, and writing objects—are performed using credential vending, which issues scoped (vended) tokens for secure access.
3029

31-
When using credential vending for Google Cloud Storage (GCS) with Apache Iceberg on
32-
Polaris, ensure that both IAM roles and HNS ACLs (if HNS is enabled) are properly configured. Even with the correct IAM
33-
role (e.g., `roles/storage.objectAdmin`), access to paths such as `gs://<bucket>/idsp_ns/sample_table4/` may fail with
34-
403 errors if HNS ACLs are missing for scoped tokens. The original access token may work, but scoped (vended) tokens
35-
require HNS ACLs on the base path or relevant subpath. Polaris does not require HNS to be enabled for basic operation,
36-
but if HNS is enabled and credential vending is used, HNS ACLs are mandatory for scoped token access. Always verify HNS ACLs
37-
in addition to IAM roles when troubleshooting GCS access issues with credential vending and HNS enabled.
30+
Polaris requires both IAM roles and [Hierarchical Namespace (HNS)](https://docs.cloud.google.com/storage/docs/hns-overview) ACLs (if HNS is enabled) to be properly configured. Even with the correct IAM role (e.g., `roles/storage.objectAdmin`), access to paths such as `gs://<bucket>/idsp_ns/sample_table4/` may fail with 403 errors if HNS ACLs are missing for scoped tokens. The original access token may work, but scoped (vended) tokens require HNS ACLs on the base path or relevant subpath.
31+
32+
**Note:** HNS is not mandatory when using GCS for a catalog in Polaris. If HNS is not enabled on the bucket, only IAM roles are required for access. Always verify HNS ACLs in addition to IAM roles when troubleshooting GCS access issues with credential vending and HNS enabled.

0 commit comments

Comments
 (0)