CREATE LOCATION
Creates a new location object in your Firebolt account, which is a secure, reusable object that stores the connection details and credentials for external data sources, like Amazon S3. Instead of entering these details each time you run a query or create a table, you can use a location object.
The location object stores the following:
- The source type specification
- Authentication credentials
- The data source URL
- Optional descriptive metadata
This makes it easier to manage data access, keeps your credentials safe, and saves you from having to repeat the same information across multiple queries.
You can use LOCATION
to centralize credential storage with managed access with Role-Based Access Control (RBAC) for CREATE
, MODIFY
, and USAGE
permissions for different users, use a single location definition for multiple tables and queries, and control access to sensitive data. LOCATION
is version control-friendly because no sensitive credentials are stored in source code.
After you create a LOCATION
, you can use the information_schema.locations
view to see details about all the locations in your account including source type, URL, description, owner and creation time.
Topics:
- Syntax
- Parameters
- Specify credentials to access Amazon S3
- Permissions
- Examples
- Notes
- Error handling
- Best practices
- Limitations
Syntax
CREATE [OR REPLACE] LOCATION [IF NOT EXISTS] <location_name> WITH
SOURCE = <source_type>
CREDENTIALS = { AWS_ACCESS_KEY_ID = '<aws_access_key_id>' AWS_SECRET_ACCESS_KEY = '<aws_secret_access_key>' [ AWS_SESSION_TOKEN = '<aws_session_token>' ] | AWS_ROLE_ARN = '<aws_role_arn>' [ AWS_ROLE_EXTERNAL_ID = '<aws_role_external_id>' ] }
URL = '<url>'
[ DESCRIPTION = '<description>' ]
Parameters
Parameter | Description |
---|---|
<location_name> | A unique identifier for the location within your account. |
<source_type> | The external data source type. Currently, Firebolt only supports AMAZON_S3 . |
<credentials_options> | Authentication parameters specific to the source type. |
<url> | The data source URL. For Amazon S3, use the following format: s3://{bucket_name}/{path} |
<description> | Optional metadata describing the location’s purpose. |
Specify credentials to access Amazon S3
You can use either access key-based or role-based credentials to authenticate to AWS. The parameters for both methods follow:
Parameter | Description | Authentication type |
---|---|---|
AWS_ACCESS_KEY_ID | Your AWS access key ID | key-based |
AWS_SECRET_ACCESS_KEY | Your AWS secret access key | key-based |
AWS_SESSION_TOKEN | Optional temporary session token for temporary credentials | key-based |
AWS_ROLE_ARN | The ARN of the IAM role to assume | role-based |
AWS_ROLE_EXTERNAL_ID | Optional external ID for role assumption | role-based |
Permissions
LOCATION
objects are managed using RBAC with the following permission levels:
Permission | Description |
---|---|
CREATE LOCATION | Create a new location object. |
MODIFY LOCATION | Modify existing location objects. |
MODIFY ANY LOCATION | Modify any location object in the account. |
LIST LOCATION | View location object details. |
LIST ANY LOCATION | View any location object in the account. |
USAGE LOCATION | Use a location object. |
USAGE ANY LOCATION | Use any location object in the account. |
Examples
- Authenticate using an access key
- Authenticate using a role
- Create a location with a description
- Create a location with an AWS session token
- Create a location only if it doesn’t exist
- Replace a location if it already exists
- Use a location to load data into an external table
- Use a location to load data using COPY statements
- Use a location to load data with a TVF
- Alter a location
- Delete a location
Authenticate using an access key
The following code example uses keys to authenticate to AWS:
CREATE LOCATION my_location WITH
SOURCE = 'AMAZON_S3'
CREDENTIALS = { AWS_ACCESS_KEY_ID = '1231' AWS_SECRET_ACCESS_KEY = '567' }
URL = 's3://my-bucket/path/to/data'
Authenticate using a role
The following code example use a role to authenticate to AWS:
CREATE LOCATION my_location WITH
SOURCE = 'AMAZON_S3'
CREDENTIALS = { AWS_ROLE_ARN = 'arn:aws:iam::123456789012:role/S3Access' }
URL = 's3://my-bucket/path/to/data'
Create a location with a description
The following code example creates a location object named my_location
, for an Amazon S3 data source with the specified URL and description:
CREATE LOCATION my_location WITH
SOURCE = 'AMAZON_S3'
CREDENTIALS = { AWS_ACCESS_KEY_ID = '1231' AWS_SECRET_ACCESS_KEY = '567' }
URL = 's3://my-bucket/path/to/data'
DESCRIPTION = 'Main data storage location'
Create a location with an AWS session token
The following code example creates a location object named my_location
, for an Amazon S3 data source with the specified URL and AWS session token:
CREATE LOCATION my_location WITH
SOURCE = 'AMAZON_S3'
CREDENTIALS = { AWS_ACCESS_KEY_ID = '1231' AWS_SECRET_ACCESS_KEY = '567' AWS_SESSION_TOKEN = 'session-token' }
URL = 's3://my-bucket/path/to/data'
Create a location only if it doesn’t exist
The following code example uses an access key to authenticate to AWS using a location only if it doesn’t already exist:
CREATE LOCATION IF NOT EXISTS my_location WITH
SOURCE = 'AMAZON_S3'
CREDENTIALS = { AWS_ACCESS_KEY_ID = '1231' AWS_SECRET_ACCESS_KEY = '567' }
URL = 's3://my-bucket/path/to/data'
Replace a location if it already exists
The following code example uses an access key to authenticate to AWS replacing a previous location if it already exists:
CREATE OR REPLACE LOCATION my_location WITH
SOURCE = 'AMAZON_S3'
CREDENTIALS = { AWS_ACCESS_KEY_ID = '1231' AWS_SECRET_ACCESS_KEY = '567' }
URL = 's3://my-bucket/path/to/data'
Use a location to load data into an external table
The following code example creates an external table my_ext_table
that uses a previously created location my_location
to load Parquet data files matching the *.parquet pattern from Amazon S3:
CREATE EXTERNAL TABLE my_ext_table (
c_id INT,
c_name TEXT
)
LOCATION = my_location
OBJECT_PATTERN = '*.parquet'
TYPE = PARQUET
For more information about using locations in external tables, see CREATE EXTERNAL TABLE.
Use a location to load data using COPY statements
The following code example uses COPY FROM
to load Parquet data files matching the *.parquet pattern from my_location
into my_table
:
COPY INTO my_table
FROM my_location
WITH
OBJECT_PATTERN = '*.parquet'
TYPE = PARQUET
For more information, see COPY TO and COPY FROM.
Use a LOCATION
to load data with a TVF
You can use LOCATION
to load data using table-valued functions (TVFs) such as READ_CSV, READ_PARQUET, and LIST_OBJECTS.
The following code example uses READ_CSV
to query data from a CSV file stored in my_location
, using the first row as headers for column names:
SELECT * FROM READ_CSV(
location => my_location,
header => TRUE
)
Alter a location
Firebolt does not yet support altering a location that has been created. This feature will be available in a future release.
Delete a location
You can use DROP LOCATION to remove a location from your Firebolt account.
The following code example deletes a LOCATION
from your Firbolt account:
DROP LOCATION [IF EXISTS] <location_name> [WITH FORCE]
{: .note} Deleting a location will affect all objects that depend on the LOCATION
that you are dropping.
Notes
- The
IF NOT EXISTS
andOR REPLACE
clauses cannot be used together - All identifiers are case-insensitive unless enclosed in double-quotes
- The
SOURCE
parameter is required. Currently, the only supported source is ‘AMAZON_S3’ - The
URL
parameter is required and must be a valid S3 URL - For more information about object identifiers, see Object identifiers
Error Handling
The system uses secure error handling for location objects:
- Generic error messages ensure security by not exposing sensitive information.
- Detailed error information is only available to users with the necessary permissions.
- Users without the required permissions are provided with instructions to contact an administrator.
Best Practices
- Use location objects instead of embedding credentials directly in queries or table definitions.
- Regularly rotate credentials stored in location objects.
- Follow the principle of least privilege when assigning permissions.
- Use clear and descriptive names and descriptions for location objects.
- Keep a record of dependencies before removing any location objects.
Limitations
- The
DROP CASCADE
functionality is not supported. - The source type cannot be modified for existing location objects.
- Location objects cannot be used alongside inline credentials in the same statement.
- Historical versions of credentials are not maintained.