This is an automated email from the ASF dual-hosted git repository.

yufei pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/polaris.git


The following commit(s) were added to refs/heads/main by this push:
     new c1c922793 Site: Added GCS related Bucket Properties for vending 
credentials. (#3066)
c1c922793 is described below

commit c1c922793adc80561e1e701a2ea567a1a689456f
Author: Saksham Ratra <[email protected]>
AuthorDate: Fri Nov 21 10:40:52 2025 +0530

    Site: Added GCS related Bucket Properties for vending credentials. (#3066)
---
 .../_index.md}                                     |  6 +++-
 .../configuring-gcs-cloud-storage-specific.md      | 32 ++++++++++++++++++++++
 2 files changed, 37 insertions(+), 1 deletion(-)

diff --git 
a/site/content/in-dev/unreleased/configuring-polaris-for-production.md 
b/site/content/in-dev/unreleased/configuring-polaris-for-production/_index.md
similarity index 97%
rename from site/content/in-dev/unreleased/configuring-polaris-for-production.md
rename to 
site/content/in-dev/unreleased/configuring-polaris-for-production/_index.md
index 2a1efe36b..0666aea1e 100644
--- a/site/content/in-dev/unreleased/configuring-polaris-for-production.md
+++ 
b/site/content/in-dev/unreleased/configuring-polaris-for-production/_index.md
@@ -173,7 +173,7 @@ Depending on your database, this may not be convenient as 
the generated credenti
 in clear text in the database.
 
 In order to provide your own credentials for `root` principal (so you can 
request tokens via
-`api/catalog/v1/oauth/tokens`), use the [Polaris Admin Tool]({{% ref 
"admin-tool" %}})
+`api/catalog/v1/oauth/tokens`), use the [Polaris Admin 
Tool](../../../../docs/admin-tool.md)
 
 You can verify the setup by attempting a token issue for the `root` principal:
 
@@ -234,3 +234,7 @@ profile (for example, `%prod`).
 
 The [Polaris Evolution](../evolution) page discusses backward compatibility and
 upgrade concerns.
+
+### Configuring Polaris for Cloud Storages
+
+For guidance on configuring specific cloud storage providers see child pages 
(links in the left-hand pane).
diff --git 
a/site/content/in-dev/unreleased/configuring-polaris-for-production/configuring-gcs-cloud-storage-specific.md
 
b/site/content/in-dev/unreleased/configuring-polaris-for-production/configuring-gcs-cloud-storage-specific.md
new file mode 100644
index 000000000..9417edfcd
--- /dev/null
+++ 
b/site/content/in-dev/unreleased/configuring-polaris-for-production/configuring-gcs-cloud-storage-specific.md
@@ -0,0 +1,32 @@
+---
+#
+# Licensed to the Apache Software Foundation (ASF) under one
+# or more contributor license agreements.  See the NOTICE file
+# distributed with this work for additional information
+# regarding copyright ownership.  The ASF licenses this file
+# to you under the Apache License, Version 2.0 (the
+# "License"); you may not use this file except in compliance
+# with the License.  You may obtain a copy of the License at
+#
+#   http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing,
+# software distributed under the License is distributed on an
+# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+# KIND, either express or implied.  See the License for the
+# specific language governing permissions and limitations
+# under the License.
+#
+title: Configuring GCS Cloud Storage
+linkTitle: Configuring GCS Cloud Storage
+type: docs
+weight: 600
+---
+
+This page provides guidance for configuring GCS Cloud Storage provider for use 
with Polaris. It covers credential vending, IAM roles, ACL requirements, and 
best practices to ensure secure and reliable integration.
+
+All catalog operations in Polaris for Google Cloud Storage (GCS)—including 
listing, reading, and writing objects—are performed using credential vending, 
which issues scoped (vended) tokens for secure access.
+
+Polaris requires both IAM roles and [Hierarchical Namespace 
(HNS)](https://docs.cloud.google.com/storage/docs/hns-overview) ACLs (if HNS is 
enabled) to be properly configured. Even with the correct IAM role (e.g., 
`roles/storage.objectAdmin`), access to paths such as 
`gs://<bucket>/idsp_ns/sample_table4/` may fail with 403 errors if HNS ACLs are 
missing for scoped tokens. The original access token may work, but scoped 
(vended) tokens require HNS ACLs on the base path or relevant subpath.
+
+**Note:** HNS is not mandatory when using GCS for a catalog in Polaris. If HNS 
is not enabled on the bucket, only IAM roles are required for access. Always 
verify HNS ACLs in addition to IAM roles when troubleshooting GCS access issues 
with credential vending and HNS enabled.

Reply via email to