yesterday
I was unable to create materialized view in databricks using all purpose cluster wanted to check do we need serverless cluster to create MV
yesterday - last edited yesterday
Hi @Shivaprasad ,
Nope, all purpose cluster are not supported. Standalone materialized views can be created/refreshed either from a Unity Catalog-enabled Pro or Serverless SQL Warehouse, or from a notebook attached to Serverless General Compute.
So we don’t necessarily need a “serverless cluster” specifically, but we do need one of the supported compute options - I.e a SQL Warehouse. An all-purpose cluster is not supported for creating standalone materialized views.
For materialized view created via pipeline you can choose serverless or classic compute:
https://docs.databricks.com/aws/en/ldp/configure-compute
Here is similar thread:
If my answer was helpful, please consider marking it as accepted solution
yesterday
Thanks. we have SQL warehouse cluster and has storage_blob_contributor_role_on_storage_account but I am still getting below error -
Encountered an error with Unity Catalog while setting up the pipeline on cluster 0521-174117-2fdl63ad-v2n.
Ensure that your Unity Catalog configuration is correct, and that required resources (e.g., catalog, schema) exist and are accessible.
Also verify that the cluster has appropriate permissions to access Unity Catalog.
Details: Operation failed: "Forbidden", 403, GET, http://sa14127e1dv0201.dfs.core.windows.net/find?upn=false&beginFrom=0000000000000000000&res..., AuthorizationFailure, , "This request is not authorized to perform this operation. RequestId:b35f3d5a-e01f-0073-0f49-e92e3b000000 Time:2026-05-21T17:41:35.2242794Z"
==========================================================================
workspace : https://adb-1976997951002494.14.azuredatabricks.net/editor/files/370237779897823?o=1976997951002494
catalog and schema has create martialized view create privileges
11 hours ago
Hi @Shivaprasad ,
It can be networking issue. Could you tell us your networking setup? Does your storage account has public network access disabled?
Are you using standalone materialized view or you're creating MV via SDP pipeline?
5 hours ago
Hi @Shivaprasad,
You generally should not create a standalone materialised view from an all-purpose cluster. Databricks documents that CREATE MATERIALIZED VIEW is supported from a Pro or Serverless SQL warehouse, or within a pipeline. For standalone materialised views, Databricks also documents that you can create them from a Databricks SQL warehouse or from a notebook running on serverless general compute.
So if you are trying this from an all-purpose cluster, that part is already a problem. A SQL warehouse is the correct route.
The second part is the important one... even when you issue the command from a SQL warehouse, Databricks creates and uses a serverless backing pipeline for the create/refresh path. Databricks explicitly says that create and refresh operations for materialised views are powered by serverless Lakeflow pipelines, and that a serverless pipeline is automatically created for Databricks SQL materialised views.
That is why the error you shared does not appear to be a simple SQL warehouse permission issue. The error is a 403 against the Unity Catalog managed storage path under __unitystorage/.../_delta_log, which strongly suggests that the backing serverless pipeline cannot access the Azure Data Lake Storage location used by Unity Catalog.
A few things you can check...
First of all, make sure you are using a Pro or Serverless SQL warehouse for CREATE MATERIALIZED VIEW, not an all-purpose cluster.
On Azure, check that Unity Catalog storage access is configured using the correct Databricks-managed identity / Access Connector path, and that the required role is assigned to that identity. The Azure Databricks guidance for Unity Catalog storage access calls out assigning the role to the managed identity, not just relying on a user-level permission.
Also, double check the exact Azure RBAC role. The documented role is Storage Blob Data Contributor, which is different from "Storage Blob Contributor".
Lastly, if the storage account is behind firewall rules, Private Link, or a VNet-injected setup, you should also verify that serverless access is configured correctly for that storage account. Databricks documents additional setup for managed identity trusted access and serverless private connectivity.
If this answer resolves your question, could you mark it as “Accept as Solution”? That helps other users quickly find the correct fix.