<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using Terraform to GRANT SELECT ON ANY FILE securable in Administration &amp; Architecture</title>
    <link>https://community.databricks.com/t5/administration-architecture/using-terraform-to-grant-select-on-any-file-securable/m-p/136512#M4298</link>
    <description>&lt;P&gt;I have a use case where service principals will read .csv files from Azure Storage Account and create views from them. This used to work in our legacy environment but we are currently migrating to Unity Catalog and when we tested our existing jobs we ran into insufficient privileges error. Error message was that the "User does not have permission SELECT on any file." I read the documentation and found the following:&lt;/P&gt;&lt;P&gt;You must have SELECT privileges on the ANY FILE securable to read using the following patterns on Unity Catalog-enabled standard clusters:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Cloud object storage using URIs.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-gb/azure/databricks/data-governance/table-acls/any-file" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-gb/azure/databricks/data-governance/table-acls/any-file&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This is exactly what we are doing. So I tested by manually granting the following:&lt;BR /&gt;&lt;BR /&gt;GRANT SELECT ON ANY FILE to `first.last@domain.com`;&lt;BR /&gt;&lt;BR /&gt;After this reading files succeeded. Now the issue is that we are managing our configuration with Terraform and I would like to do add this into the configuration as well. However, I couldn't find which resource I should use to create this privilege. Any idea how to achieve this using Terraform? Or is there a better way of doing this? This is the way teams in my organization have done things before, so I'm not sure if they are willing to change things that much.&lt;/P&gt;</description>
    <pubDate>Wed, 29 Oct 2025 08:16:55 GMT</pubDate>
    <dc:creator>PNC</dc:creator>
    <dc:date>2025-10-29T08:16:55Z</dc:date>
    <item>
      <title>Using Terraform to GRANT SELECT ON ANY FILE securable</title>
      <link>https://community.databricks.com/t5/administration-architecture/using-terraform-to-grant-select-on-any-file-securable/m-p/136512#M4298</link>
      <description>&lt;P&gt;I have a use case where service principals will read .csv files from Azure Storage Account and create views from them. This used to work in our legacy environment but we are currently migrating to Unity Catalog and when we tested our existing jobs we ran into insufficient privileges error. Error message was that the "User does not have permission SELECT on any file." I read the documentation and found the following:&lt;/P&gt;&lt;P&gt;You must have SELECT privileges on the ANY FILE securable to read using the following patterns on Unity Catalog-enabled standard clusters:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Cloud object storage using URIs.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-gb/azure/databricks/data-governance/table-acls/any-file" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-gb/azure/databricks/data-governance/table-acls/any-file&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This is exactly what we are doing. So I tested by manually granting the following:&lt;BR /&gt;&lt;BR /&gt;GRANT SELECT ON ANY FILE to `first.last@domain.com`;&lt;BR /&gt;&lt;BR /&gt;After this reading files succeeded. Now the issue is that we are managing our configuration with Terraform and I would like to do add this into the configuration as well. However, I couldn't find which resource I should use to create this privilege. Any idea how to achieve this using Terraform? Or is there a better way of doing this? This is the way teams in my organization have done things before, so I'm not sure if they are willing to change things that much.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2025 08:16:55 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/using-terraform-to-grant-select-on-any-file-securable/m-p/136512#M4298</guid>
      <dc:creator>PNC</dc:creator>
      <dc:date>2025-10-29T08:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: Using Terraform to GRANT SELECT ON ANY FILE securable</title>
      <link>https://community.databricks.com/t5/administration-architecture/using-terraform-to-grant-select-on-any-file-securable/m-p/136559#M4300</link>
      <description>&lt;P&gt;you can try using this code.&lt;/P&gt;&lt;LI-CODE lang="python"&gt;resource "databricks_grants" "any_file_select_grant" {
  principal = "your_user_or_group_name" // Replace with the actual user or group
  privileges {
    privilege_type = "SELECT"
    securable_type = "ANY FILE"
  }
}&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 29 Oct 2025 14:53:08 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/using-terraform-to-grant-select-on-any-file-securable/m-p/136559#M4300</guid>
      <dc:creator>nayan_wylde</dc:creator>
      <dc:date>2025-10-29T14:53:08Z</dc:date>
    </item>
    <item>
      <title>Re: Using Terraform to GRANT SELECT ON ANY FILE securable</title>
      <link>https://community.databricks.com/t5/administration-architecture/using-terraform-to-grant-select-on-any-file-securable/m-p/149763#M4946</link>
      <description>&lt;PRE&gt;How about... (not tried it myself)&lt;BR /&gt;&lt;BR /&gt;resource "databricks_sql_permissions" "grant_select_any_file" {&lt;BR /&gt;any_file = true&lt;BR /&gt;&lt;BR /&gt;  privilege_assignments {&lt;BR /&gt;    principal = "your-role"&lt;BR /&gt;    privileges = ["SELECT"]&lt;BR /&gt; }&lt;BR /&gt;}&lt;/PRE&gt;</description>
      <pubDate>Wed, 04 Mar 2026 11:00:36 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/using-terraform-to-grant-select-on-any-file-securable/m-p/149763#M4946</guid>
      <dc:creator>ThePussCat</dc:creator>
      <dc:date>2026-03-04T11:00:36Z</dc:date>
    </item>
  </channel>
</rss>

