CREATE SINK: Iceberg
View as MarkdownUse CREATE SINK ... INTO ICEBERG CATALOG... to create Iceberg sinks. Iceberg sinks write data from Materialize into an Iceberg table hosted on
AWS S3 Tables. As data changes in Materialize, your Iceberg tables are
automatically kept up to date.
To create an Iceberg sink, you need:
- An AWS connection for authentication with object storage.
- An Iceberg catalog connection to specify access parameters to your Iceberg catalog.
Syntax
CREATE SINK [IF NOT EXISTS] <sink_name>
[IN CLUSTER <cluster_name>]
FROM <item_name>
INTO ICEBERG CATALOG CONNECTION <catalog_connection> (
NAMESPACE = '<namespace>',
TABLE = '<table>'
)
USING AWS CONNECTION <aws_connection>
KEY ( <key_col> [, ...] ) [NOT ENFORCED]
MODE UPSERT
WITH (COMMIT INTERVAL = '<interval>')
| Syntax element | Description |
|---|---|
<sink_name>
|
The name for the sink. |
| IF NOT EXISTS | Optional. If specified, do not throw an error if a sink with the same name already exists. |
IN CLUSTER <cluster_name>
|
Optional. The cluster to maintain this sink. If unspecified, defaults to the active cluster. |
<item_name>
|
The name of the source, table, or materialized view to sink. |
ICEBERG CATALOG CONNECTION <catalog_connection>
|
The name of the Iceberg catalog connection to use. |
NAMESPACE '<namespace>'
|
The Iceberg namespace (database) containing the table. |
TABLE '<table>'
|
The name of the unpartitioned Iceberg table to write to. If the table doesn’t exist, Materialize creates it automatically. For details, see Iceberg table creation. |
USING AWS CONNECTION <aws_connection>
|
The AWS connection for object storage access. |
KEY ( <key_col> [, …] )
|
The columns that uniquely identify rows. Materialize validates that the key is unique unless NOT ENFORCED is specified.
|
| NOT ENFORCED | Optional. Disable validation of key uniqueness. Use only when you have outside knowledge that the key is unique. |
| MODE UPSERT |
Indicates that the sink uses upsert semantics based on the KEY.
|
COMMIT INTERVAL '<interval>'
|
How frequently to commit snapshots to Iceberg (e.g., '60s', '5m'). See Commit interval tradeoffs.
|
Details
Iceberg sinks continuously stream changes from Materialize to an Iceberg table. Specifically, Materialize writes data as Parquet files to the object storage backing your Iceberg catalog.
At each COMMIT INTERVAL:
- All pending writes are flushed to Parquet data files. See Type mapping.
- Delete files are written for any updates or deletes. See Delete handling.
- A new Iceberg snapshot is committed atomically.
When the snapshot is committed, the data is available to downstream query engines. See Commit interval tradeoffs.
Iceberg table creation
If the specified Iceberg table does not exist, Materialize creates the table. The new Iceberg table:
- Uses the schema derived from your Materialize object.
- Uses Iceberg format version 2.
Materialize creates unpartitioned tables. Partitioned tables are not supported.
See also: Restrictions and limitations.
Exactly-once delivery
Iceberg sinks provide exactly-once delivery. After a restart, Materialize resumes from the last committed snapshot without duplicating data.
Materialize stores progress information in Iceberg snapshot metadata
properties (mz-frontier and mz-sink-version).
Commit interval tradeoffs
The COMMIT INTERVAL setting involves tradeoffs between latency and efficiency:
Shorter intervals (e.g., < 60s) |
Longer intervals (e.g., 5m) |
|---|---|
| Lower latency - data visible sooner | Higher latency - data takes longer to appear |
| More small files - can degrade query performance | Fewer, larger files - better query performance |
| Higher catalog overhead | Lower catalog overhead |
| Higher S3 write costs (more PUT requests) | Lower S3 write costs |
Recommendations:
- For production:
60sto5m - For batch analytics:
5mto15m
60s.
Short commit intervals increase catalog overhead and produce many small files.
Small files will result in degraded query performance. It also increases load on
the Iceberg metadata, which can result in a degraded catalog and non-responsive
queries.
Unique keys
The Iceberg sink uses upsert semantics based on the KEY. The columns you
specify as the KEY must uniquely identify rows. Materialize validates that the
key is unique; if it cannot prove uniqueness, you’ll receive an error.
If you have outside knowledge that the key is unique, you can bypass validation
using NOT ENFORCED. However, if the key is not actually unique, downstream
consumers may see incorrect results.
Type mapping
Materialize converts SQL types to Iceberg/Parquet types:
| SQL type | Iceberg type |
|---|---|
boolean |
boolean |
smallint, integer |
int |
bigint |
long |
real |
float |
double precision |
double |
numeric |
decimal(38, scale) |
date |
date |
time |
time (microsecond) |
timestamp |
timestamp (microsecond) |
timestamptz |
timestamptz (microsecond) |
text, varchar |
string |
bytea |
binary |
uuid |
fixed(16) |
jsonb |
string |
record |
struct |
list |
list |
map |
map |
Restrictions and limitations
- Your S3 Tables bucket must be in the same AWS region as your Materialize deployment.
- Partitioned tables are not supported.
-
Schema evolution of an Iceberg table is not supported. If the
SINK FROMobject’s schema changes, you must drop and recreate the sink.
Delete handling
Iceberg sinks use a hybrid delete strategy:
- Position deletes: Used when a row is inserted and then deleted or updated within the same commit interval. Materialize records the exact file path and row position.
- Equality deletes: Used when deleting or updating a row from a previous
snapshot. Materialize writes a delete file containing the
KEYcolumn values.
This means short-lived rows use efficient position deletes, while updates to older data use equality deletes.
Required privileges
CREATEprivileges on the containing schema.SELECTprivileges on the item being written out to an external system.- NOTE: if the item is a materialized view, then the view owner must also have the necessary privileges to execute the view definition.
CREATEprivileges on the containing cluster if the sink is created in an existing cluster.CREATECLUSTERprivileges on the system if the sink is not created in an existing cluster.USAGEprivileges on all connections and secrets used in the sink definition.USAGEprivileges on the schemas that all connections and secrets in the statement are contained in.
Troubleshooting
Sink creation fails with “input compacted past resume upper”
This error occurs when the source data has been compacted beyond the point where the sink last committed. This can happen after a Materialize backup/restore operation. You may need to drop and recreate the sink, which will re-snapshot the entire source relation.
Commit conflicts
If another process modifies the Iceberg table while Materialize is committing, you may see commit conflict errors. Materialize will automatically retry, but if conflicts persist, ensure no other writers are modifying the same table.
Examples
Prerequisites: Create connections
To create an Iceberg sink, you need an AWS connection and an Iceberg catalog connection.
The following example creates an AWS connection and an Iceberg catalog connection:
-- First, create an AWS connection for authentication
CREATE CONNECTION aws_connection
TO AWS (ASSUME ROLE ARN = 'arn:aws:iam::123456789012:role/MaterializeIceberg');
-- Create the Iceberg catalog connection pointing to S3 Tables
CREATE CONNECTION iceberg_catalog_connection TO ICEBERG CATALOG (
CATALOG TYPE = 's3tablesrest',
URL = 'https://s3tables.us-east-1.amazonaws.com/iceberg',
WAREHOUSE = 'arn:aws:s3tables:us-east-1:123456789012:bucket/my-table-bucket',
AWS CONNECTION = aws_connection
);
Creating a sink
Using the previously created AWS and Iceberg catalog connection, the following example creates an Iceberg sink with a composite key:
CREATE SINK user_events_iceberg
IN CLUSTER analytics_cluster
FROM user_events
INTO ICEBERG CATALOG CONNECTION iceberg_catalog_connection (
NAMESPACE = 'events',
TABLE = 'user_events'
)
USING AWS CONNECTION aws_connection
KEY (user_id, event_timestamp)
MODE UPSERT
WITH (COMMIT INTERVAL = '1m');
The required KEY clause uniquely identifies rows; in this example, it uses a
composite key of user_id and event_timestamp. Materialize validates that
this key is unique in the source data.
Bypassing unique key validation
If Materialize cannot prove your key is unique but you have outside knowledge
that it is, you can bypass validation by including NOT ENFORCED option:
CREATE SINK deduped_sink
IN CLUSTER my_cluster
FROM my_source
INTO ICEBERG CATALOG CONNECTION iceberg_catalog_connection (
NAMESPACE = 'raw',
TABLE = 'events'
)
USING AWS CONNECTION aws_connection
KEY (event_id) NOT ENFORCED
MODE UPSERT
WITH (COMMIT INTERVAL = '1m');