| ALTER CLUSTER | 
Ownership of the cluster.
To rename a cluster, you must also have membership in the <new_owner_role>.
To swap names with another cluster, you must also have ownership of the other
cluster. | 
| ALTER CONNECTION | 
Ownership of the connection. | 
| ALTER DEFAULT PRIVILEGES | 
Role membership in role_name.USAGEprivileges on the containing database ifdatabase_nameis specified.USAGEprivileges on the containing schema ifschema_nameis specified.superuser status if the target_role is PUBLICor ALL ROLES is
specified. | 
| ALTER INDEX |  | 
| ALTER MATERIALIZED VIEW | 
Ownership of the materialized view. | 
| ALTER NETWORK POLICY | 
Ownership of the network policy. | 
| ALTER ROLE | 
CREATEROLEprivileges on the system. | 
| ALTER ... OWNER | 
Ownership of the object being altered.Role membership in new_owner.CREATEprivileges on the containing cluster if the object is a cluster replica.CREATEprivileges on the containing database if the object is a schema.CREATEprivileges on the containing schema if the object is namespaced by a
schema. | 
| ALTER ... RENAME | 
Ownership of the object being renamed. | 
| ALTER ... SWAP | 
Ownership of both objects being swapped. | 
| ALTER SECRET | 
Ownership of the secret being altered. | 
| ALTER SINK | 
Ownership of the sink being altered.SELECTprivileges on the new relation being written out to an external system.CREATEprivileges on the cluster maintaining the sink.USAGEprivileges on all connections and secrets used in the sink definition.USAGEprivileges on the schemas that all connections and secrets in the
statement are contained in. | 
| ALTER SOURCE | 
Ownership of the source being altered. | 
| ALTER SYSTEM RESET |  | 
| ALTER SYSTEM SET |  | 
| COMMENT ON | 
Ownership of the object being commented on (unless the object is a role).To comment on a role, you must have the CREATEROLEprivilege. | 
| COPY FROM | 
USAGEprivileges on the schema containing the table.INSERTprivileges on the table. | 
| COPY TO | 
USAGEprivileges on the schemas that all relations and types in the query are contained in.SELECTprivileges on all relations in the query.
NOTE: if any item is a view, then the view owner must also have the necessary privileges to
execute the view definition. Even if the view owner is a superuser, they still must explicitly be
granted the necessary privileges.USAGEprivileges on all types used in the query.USAGEprivileges on the active cluster. | 
| CREATE CLUSTER | 
CREATECLUSTERprivileges on the system. | 
| CREATE CLUSTER REPLICA | 
Ownership of the cluster. | 
| CREATE CONNECTION | 
CREATEprivileges on the containing schema.USAGEprivileges on all connections and secrets used in the connection definition.USAGEprivileges on the schemas that all connections and secrets in the statement are contained in. | 
| CREATE DATABASE | 
CREATEDBprivileges on the system. | 
| CREATE INDEX | 
Ownership of the object on which to create the index.CREATEprivileges on the containing schema.CREATEprivileges on the containing cluster.USAGEprivileges on all types used in the index definition.USAGEprivileges on the schemas that all types in the statement are contained in. | 
| CREATE MATERIALIZED VIEW | 
CREATEprivileges on the containing schema.CREATEprivileges on the containing cluster.USAGEprivileges on all types used in the materialized view definition.USAGEprivileges on the schemas for the types used in the statement.Ownership of the existing view if replacing an existing
view with the same name (i.e., OR REPLACEis specified inCREATE MATERIALIZED VIEWcommand). | 
| CREATE NETWORK POLICY | 
CREATENETWORKPOLICYprivileges on the system. | 
| CREATE ROLE | 
CREATEROLEprivileges on the system. | 
| CREATE SCHEMA | 
CREATEprivileges on the containing database. | 
| CREATE SECRET | 
CREATEprivileges on the containing schema. | 
| CREATE SINK | 
CREATEprivileges on the containing schema.SELECTprivileges on the item being written out to an external system.
NOTE: if the item is a materialized view, then the view owner must also have the necessary privileges to
execute the view definition.CREATEprivileges on the containing cluster if the sink is created in an existing cluster.CREATECLUSTERprivileges on the system if the sink is not created in an existing cluster.USAGEprivileges on all connections and secrets used in the sink definition.USAGEprivileges on the schemas that all connections and secrets in the
statement are contained in. | 
| CREATE SOURCE | 
CREATEprivileges on the containing schema.CREATEprivileges on the containing cluster if the source is created in an existing cluster.CREATECLUSTERprivileges on the system if the source is not created in an existing cluster.USAGEprivileges on all connections and secrets used in the source definition.USAGEprivileges on the schemas that all connections and secrets in the
statement are contained in. | 
| CREATE TABLE | 
CREATEprivileges on the containing schema.USAGEprivileges on all types used in the table definition.USAGEprivileges on the schemas that all types in the statement are
contained in. | 
| CREATE TYPE | 
CREATEprivileges on the containing schema.USAGEprivileges on all types used in the type definition.USAGEprivileges on the schemas that all types in the statement are
contained in. | 
| CREATE VIEW | 
CREATEprivileges on the containing schema.USAGEprivileges on all types used in the view definition.USAGEprivileges on the schemas for the types in the statement.Ownership of the existing view if replacing an existing
view with the same name (i.e., OR REPLACEis specified inCREATE VIEWcommand). | 
| DELETE | 
USAGEprivileges on the schemas that all relations and types in the query are contained in.DELETEprivileges ontable_name.SELECTprivileges on all relations in the query.
NOTE: if any item is a view, then the view owner must also have the necessary privileges to
execute the view definition. Even if the view owner is a superuser, they still must explicitly be
granted the necessary privileges.USAGEprivileges on all types used in the query.USAGEprivileges on the active cluster. | 
| DROP CLUSTER REPLICA | 
Ownership of the dropped cluster replica.USAGEprivileges on the containing cluster. | 
| DROP CLUSTER | 
Ownership of the dropped cluster. | 
| DROP CONNECTION | 
Ownership of the dropped connection.USAGEprivileges on the containing schema. | 
| DROP DATABASE | 
Ownership of the dropped database. | 
| DROP INDEX | 
Ownership of the dropped index.USAGEprivileges on the containing schema. | 
| DROP MATERIALIZED VIEW | 
Ownership of the dropped materialized view.USAGEprivileges on the containing schema. | 
| DROP NETWORK POLICY | 
CREATENETWORKPOLICYprivileges on the system. | 
| DROP OWNED | 
Role membership in role_name. | 
| DROP ROLE | 
CREATEROLEprivileges on the system. | 
| DROP SCHEMA | 
Ownership of the dropped schema.USAGEprivileges on the containing database. | 
| DROP SECRET | 
Ownership of the dropped secret.USAGEprivileges on the containing schema. | 
| DROP SINK | 
Ownership of the dropped sink.USAGEprivileges on the containing schema. | 
| DROP SOURCE | 
Ownership of the dropped source.USAGEprivileges on the containing schema. | 
| DROP TABLE | 
Ownership of the dropped table.USAGEprivileges on the containing schema. | 
| DROP TYPE | 
Ownership of the dropped type.USAGEprivileges on the containing schema. | 
| DROP USER | 
CREATEROLEprivileges on the system. | 
| DROP VIEW | 
Ownership of the dropped view.USAGEprivileges on the containing schema. | 
| EXPLAIN ANALYZE | 
USAGEprivileges on the schemas that all relations in the explainee are
contained in. | 
| EXPLAIN FILTER PUSHDOWN | 
USAGEprivileges on the schemas that all relations in the explainee are
contained in. | 
| EXPLAIN PLAN | 
USAGEprivileges on the schemas that all relations in the explainee are
contained in. | 
| EXPLAIN SCHEMA | 
USAGEprivileges on the schemas that all items in the query are contained
in. | 
| EXPLAIN TIMESTAMP | 
USAGEprivileges on the schemas that all relations in the query are
contained in. | 
| GRANT PRIVILEGE | 
Ownership of affected objects.USAGEprivileges on the containing database if the affected object is a schema.USAGEprivileges on the containing schema if the affected object is namespaced by a schema.superuser status if the privilege is a system privilege. | 
| GRANT ROLE | 
CREATEROLEprivileges on the system. | 
| INSERT | 
USAGEprivileges on the schemas that all relations and types in the query are contained in.INSERTprivileges ontable_name.SELECTprivileges on all relations in the query.
NOTE: if any item is a view, then the view owner must also have the necessary privileges to
execute the view definition. Even if the view owner is a superuser, they still must explicitly be
granted the necessary privileges.USAGEprivileges on all types used in the query.USAGEprivileges on the active cluster. | 
| REASSIGN OWNED | 
Role membership in old_roleandnew_role. | 
| REVOKE PRIVILEGE | 
Ownership of affected objects.USAGEprivileges on the containing database if the affected object is a schema.USAGEprivileges on the containing schema if the affected object is namespaced by a schema.superuser status if the privilege is a system privilege. | 
| REVOKE ROLE | 
CREATEROLEprivileges on the systems. | 
| SELECT | 
SELECTprivileges on all directly referenced relations in the query. If
the directly referenced relation is a view or materialized view:
USAGEprivileges on the schemas that contain the relations in the query.
USAGEprivileges on the active cluster.
 | 
| SHOW COLUMNS | 
USAGEprivileges on the schema containingitem_ref. | 
| SHOW CREATE CLUSTER | There are no privileges required to execute this statement. | 
| SHOW CREATE CONNECTION | 
USAGEprivileges on the schema containing the connection. | 
| SHOW CREATE INDEX | 
USAGEprivileges on the schema containing the index. | 
| SHOW CREATE MATERIALIZED VIEW | 
USAGEprivileges on the schema containing the materialized view. | 
| SHOW CREATE TYPE | 
USAGEprivileges on the schema containing the table. | 
| SHOW CREATE SINK | 
USAGEprivileges on the schema containing the sink. | 
| SHOW CREATE SOURCE | 
USAGEprivileges on the schema containing the source. | 
| SHOW CREATE TABLE | 
USAGEprivileges on the schema containing the table. | 
| SHOW CREATE VIEW | 
USAGEprivileges on the schema containing the view. | 
| SUBSCRIBE | 
USAGEprivileges on the schemas that all relations and types in the query are contained in.SELECTprivileges on all relations in the query.
NOTE: if any item is a view, then the view owner must also have the necessary privileges to
execute the view definition. Even if the view owner is a superuser, they still must explicitly be
granted the necessary privileges.USAGEprivileges on all types used in the query.USAGEprivileges on the active cluster. | 
| UPDATE | 
USAGEprivileges on the schemas that all relations and types in the query are contained in.UPDATEprivileges on the table being updated.SELECTprivileges on all relations in the query.
NOTE: if any item is a view, then the view owner must also have the necessary privileges to
execute the view definition. Even if the view owner is a superuser, they still must explicitly be
granted the necessary privileges.USAGEprivileges on all types used in the query.USAGEprivileges on the active cluster. | 
| VALIDATE CONNECTION | 
USAGEprivileges on the containing schema.USAGEprivileges on the connection. |