1 réponse
- Le plus récent
- Le plus de votes
- La plupart des commentaires
0
Thank you for asking your question.
Please make sure you activate the role by SET ROLE role_name
or SET ROLE ALL
before using the role based privileges.
You can also use the activate_all_roles_on_login
DB cluster parameter to automatically activate all roles when a user connects to a DB instance. When this parameter is set, you don't have to call the SET ROLE
statement explicitly to activate a role.
You can find more detailed procedure on this in our and MySQL documents.
I hope this might help.
- https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/AuroraMySQL.Integrating.LoadFromS3.html#AuroraMySQL.Integrating.LoadFromS3.Grant
- https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/Aurora.AuroraMySQL.Compare-80-v3.html#AuroraMySQL.privilege-model
- https://dev.mysql.com/doc/refman/8.0/en/server-system-variables.html#sysvar_activate_all_roles_on_login
répondu il y a un an
Contenus pertinents
- demandé il y a 6 mois
- demandé il y a un an
- demandé il y a 3 mois
- AWS OFFICIELA mis à jour il y a un an
- AWS OFFICIELA mis à jour il y a un an
- AWS OFFICIELA mis à jour il y a 2 ans
- AWS OFFICIELA mis à jour il y a un an
I granted access by running the following:
GRANT AWS_LOAD_S3_ACCESS TO 'data_etl_user'@'%';