-
Notifications
You must be signed in to change notification settings - Fork 8.3k
Delayed IAM Role Policy Updates When Using aws_role_arn with DataLakeCatalog #97858
Copy link
Copy link
Closed
Labels
questionQuestion?Question?
Description
@antonio2368 I am validating a PR related to DataLakeCatalog with aws_role_arn and would like confirmation that I understand the intended behavior correctly.
Setup
- ClickHouse database created with
ENGINE = DataLakeCatalog,catalog_type = 'glue' - Access via IAM user that can only
sts:AssumeRole - Actual permissions come from the assumed role
Expected behavior
When aws_role_arn is specified, all Glue and S3 access should be evaluated strictly using the policies attached to that role, and permission changes on the role should be reflected promptly.
Observed behavior
- When Glue and S3 permissions are removed from the role, ClickHouse continues to successfully execute
SHOW TABLESand queries for several minutes. - Permission changes on the role (add/remove Glue or S3 policies) take 3–5 minutes to take effect unless the ClickHouse server is restarted.
- Restarting the server applies role permission changes immediately.
- Dropping/recreating the DataLake database does not force permission refresh.
- In contrast, modifying permissions directly on an IAM user is reflected by ClickHouse in under ~10 seconds.
Questions
- Is this delay expected when using
aws_role_arn(STS assumed roles)? - Does ClickHouse cache STS credentials or Glue metadata in a way that delays IAM role policy updates?
- Is there a recommended way to force permission refresh without restarting the server?
Any guidance on expected behavior or configuration options would be appreciated.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
questionQuestion?Question?