managed_table_storage_api_scheme and set the bucket name via managed_table_bucket_name_override.
Prerequisites
Before you begin, ensure that you have the following installed and configured:- A Kubernetes cluster (v1.19+)
kubectlcommand-line tool configured to access your clusterhelm(v3+) installed on your local machine- An AWS account with permissions to create S3 buckets, IAM roles, and IAM policies
Use Amazon S3
The following examples use an S3 bucket namedfirebolt-core-demo-data but you can choose any name you like.
Create an S3 bucket
IAM role and IAM policy
Create an IAM role with the following IAM policy that grants Firebolt Core permissions to manage objects in this bucket. Use a mechanism like AWS IRSA or AWS Pod Identity to assign an IAM role with these permissions to your Firebolt Core workload.Configure Core to use S3
Setaws_region, managed_table_storage_api_scheme and managed_table_bucket_name_override in your Firebolt Core node configuration.