This is an automated email from the ASF dual-hosted git repository.

dataroaring pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/doris-website.git


The following commit(s) were added to refs/heads/master by this push:
     new 3a1f2e91683 [chore](iam role) Optimize the document format about aws 
iam role (#2507)
3a1f2e91683 is described below

commit 3a1f2e91683e02e9512ee1678e18d0412ab37873
Author: Lei Zhang <[email protected]>
AuthorDate: Fri Jun 20 15:36:36 2025 +0800

    [chore](iam role) Optimize the document format about aws iam role (#2507)
    
    ## Versions
    
    - [x] dev
    - [x] 3.0
    - [ ] 2.1
    - [ ] 2.0
    
    ## Languages
    
    - [x] Chinese
    - [x] English
    
    ## Docs Checklist
    
    - [ ] Checked by AI
    - [ ] Test Cases Built
---
 .../aws-authentication-and-authorization.md        | 32 +++++++++++-----------
 .../aws-authentication-and-authorization.md        | 30 ++++++++++----------
 .../aws-authentication-and-authorization.md        | 30 ++++++++++----------
 .../aws-authentication-and-authorization.md        | 32 +++++++++++-----------
 4 files changed, 62 insertions(+), 62 deletions(-)

diff --git 
a/docs/admin-manual/auth/integrations/aws-authentication-and-authorization.md 
b/docs/admin-manual/auth/integrations/aws-authentication-and-authorization.md
index f5f208dd597..0b6af5d24d8 100644
--- 
a/docs/admin-manual/auth/integrations/aws-authentication-and-authorization.md
+++ 
b/docs/admin-manual/auth/integrations/aws-authentication-and-authorization.md
@@ -32,7 +32,7 @@ Doris supports accessing AWS service resources through two 
authentication method
 
 Doris enables access to external data sources by configuring `AWS IAM User` 
credentials(equal to `access_key` and `secret_key`), below are the detailed 
configuration steps(for more information, refer to the AWS doc [IAM 
users](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users.html)):
 
-### Step1 create an IAM User and configure policies
+### Step1 Create an IAM User and configure policies
 
 1. Login to the `AWS Console` and create an `IAM User`​
 
@@ -125,7 +125,7 @@ S3 write policy template​​ (Applies to Doris features 
requiring read/write a
 
 After completing all configurations in Step 1, you will obtain `access_key` 
and `secret_key`. Use these credentials to access doris features as shown in 
the following examples:
 
-S3 Load
+#### S3 Load
 ```SQL
   LOAD LABEL s3_load_2022_04_01
   (
@@ -149,7 +149,7 @@ S3 Load
   );
 ```
 
-TVF
+#### TVF
 ```SQL
   SELECT * FROM S3 (
       'uri' = 's3://your_bucket/path/to/tvf_test/test.parquet',
@@ -161,7 +161,7 @@ TVF
   )
 ```
 
-External Catalog
+#### External Catalog
 ```SQL
   CREATE CATALOG iceberg_catalog PROPERTIES (
       'type' = 'iceberg',
@@ -174,7 +174,7 @@ External Catalog
   );
 ```
 
-Storage Vault
+#### Storage Vault
 ```SQL
 CREATE STORAGE VAULT IF NOT EXISTS s3_demo_vault
 PROPERTIES (
@@ -190,7 +190,7 @@ PROPERTIES (
 );
 ```
 
-Export
+#### Export
 ```SQL
 EXPORT TABLE s3_test TO "s3://your_bucket/a/b/c" 
 PROPERTIES (
@@ -204,7 +204,7 @@ PROPERTIES (
 )
 ```
 
-Repository
+#### Repository
 ```SQL
 CREATE REPOSITORY `s3_repo`
 WITH S3
@@ -218,7 +218,7 @@ PROPERTIES
 );
 ```
 
-Resource
+#### Resource
 ```SQL
 CREATE RESOURCE "remote_s3"
 PROPERTIES
@@ -391,7 +391,7 @@ S3 write policy template​​ (Applies to Doris features 
requiring read/write a
 }
 ```
 
-#### Step4 Use doris features with Assumed Role via SQL, according to 
`role_arn` and `external_id` fields;
+### Step4 Use doris features with Assumed Role via SQL, according to 
`role_arn` and `external_id` fields
 
 After completing the above configurations, obtain the target account's 
`role_arn` and `external_id` (if applicable). 
 Use these parameters in doris SQL statements as shown below:
@@ -402,7 +402,7 @@ Common important key parameters:​​
 "s3.external_id" = "<your-external-id>"      -- option parameter
 ```
 
-S3 Load
+#### S3 Load
 ```SQL
   LOAD LABEL s3_load_2022_04_01
   (
@@ -426,7 +426,7 @@ S3 Load
   );
 ```
 
-TVF
+#### TVF
 ```SQL
   SELECT * FROM S3 (
       "uri" = "s3://your_bucket/path/to/tvf_test/test.parquet",
@@ -438,7 +438,7 @@ TVF
   )
 ```
 
-External Catalog
+#### External Catalog
 ```SQL
   CREATE CATALOG iceberg_catalog PROPERTIES (
       "type" = "iceberg",
@@ -451,7 +451,7 @@ External Catalog
   );
 ```
 
-Storage Vault
+#### Storage Vault
 ```SQL
 CREATE STORAGE VAULT IF NOT EXISTS s3_demo_vault
 PROPERTIES (
@@ -467,7 +467,7 @@ PROPERTIES (
 );
 ```
 
-Export
+#### Export
 ```SQL
 EXPORT TABLE s3_test TO "s3://your_bucket/a/b/c" 
 PROPERTIES (
@@ -481,7 +481,7 @@ PROPERTIES (
 )
 ```
 
-Repository
+#### Repository
 ```SQL
 CREATE REPOSITORY `s3_repo`
 WITH S3
@@ -495,7 +495,7 @@ PROPERTIES
 );
 ```
 
-Resource
+#### Resource
 ```SQL
 CREATE RESOURCE "remote_s3"
 PROPERTIES
diff --git 
a/i18n/zh-CN/docusaurus-plugin-content-docs/current/admin-manual/auth/integrations/aws-authentication-and-authorization.md
 
b/i18n/zh-CN/docusaurus-plugin-content-docs/current/admin-manual/auth/integrations/aws-authentication-and-authorization.md
index 02f4e696109..96740832388 100644
--- 
a/i18n/zh-CN/docusaurus-plugin-content-docs/current/admin-manual/auth/integrations/aws-authentication-and-authorization.md
+++ 
b/i18n/zh-CN/docusaurus-plugin-content-docs/current/admin-manual/auth/integrations/aws-authentication-and-authorization.md
@@ -125,7 +125,7 @@ S3 Bucket写策略模板, 适用于需要读取、列出和写入bucket对象的
 
 完成上述Step1中的所有配置后,可获得`access_key`和`secret_key`访问密钥,通过访问密钥可以使用Doris对应的功能,具体例子如下:
 
-S3 Load
+#### S3 Load
 ```SQL
   LOAD LABEL s3_load_2022_04_01
   (
@@ -149,7 +149,7 @@ S3 Load
   );
 ```
 
-TVF
+#### TVF
 ```SQL
   SELECT * FROM S3 (
       'uri' = 's3://your_bucket/path/to/tvf_test/test.parquet',
@@ -161,7 +161,7 @@ TVF
   )
 ```
 
-External Catalog
+#### External Catalog
 ```SQL
   CREATE CATALOG iceberg_catalog PROPERTIES (
       'type' = 'iceberg',
@@ -174,7 +174,7 @@ External Catalog
   );
 ```
 
-Storage Vault
+#### Storage Vault
 ```SQL
 CREATE STORAGE VAULT IF NOT EXISTS s3_demo_vault
 PROPERTIES (
@@ -190,7 +190,7 @@ PROPERTIES (
 );
 ```
 
-Export
+#### Export
 ```SQL
 EXPORT TABLE s3_test TO "s3://your_bucket/a/b/c" 
 PROPERTIES (
@@ -204,7 +204,7 @@ PROPERTIES (
 )
 ```
 
-Repository
+#### Repository
 ```SQL
 CREATE REPOSITORY `s3_repo`
 WITH S3
@@ -218,7 +218,7 @@ PROPERTIES
 );
 ```
 
-Resource
+#### Resource
 ```SQL
 CREATE RESOURCE "remote_s3"
 PROPERTIES
@@ -391,7 +391,7 @@ S3 Bucket写策略模板, 适用于需要往bucket中读取和写入对象的Dor
 }
 ```
 
-#### Step4 通过`role_arn`和`external_id`字段使用Doris对应SQL功能
+### Step4 通过`role_arn`和`external_id`字段使用Doris对应SQL功能
 
 通过上述配置步骤完成assume role需要的权限配置后,可得到一个目标账户的`role_arn`信息和`external_id` (如有),
 
@@ -402,7 +402,7 @@ S3 Bucket写策略模板, 适用于需要往bucket中读取和写入对象的Dor
 "s3.external_id" = "<your-external-id>"      -- 可选参数
 ```
 
-S3 Load
+#### S3 Load
 ```SQL
   LOAD LABEL s3_load_2022_04_01
   (
@@ -426,7 +426,7 @@ S3 Load
   );
 ```
 
-TVF
+#### TVF
 ```SQL
   SELECT * FROM S3 (
       "uri" = "s3://your_bucket/path/to/tvf_test/test.parquet",
@@ -438,7 +438,7 @@ TVF
   )
 ```
 
-External Catalog
+#### External Catalog
 ```SQL
   CREATE CATALOG iceberg_catalog PROPERTIES (
       "type" = "iceberg",
@@ -451,7 +451,7 @@ External Catalog
   );
 ```
 
-Storage Vault
+#### Storage Vault
 ```SQL
 CREATE STORAGE VAULT IF NOT EXISTS s3_demo_vault
 PROPERTIES (
@@ -467,7 +467,7 @@ PROPERTIES (
 );
 ```
 
-Export
+#### Export
 ```SQL
 EXPORT TABLE s3_test TO "s3://your_bucket/a/b/c" 
 PROPERTIES (
@@ -481,7 +481,7 @@ PROPERTIES (
 )
 ```
 
-Repository
+#### Repository
 ```SQL
 CREATE REPOSITORY `s3_repo`
 WITH S3
@@ -495,7 +495,7 @@ PROPERTIES
 );
 ```
 
-Resource
+#### Resource
 ```SQL
 CREATE RESOURCE "remote_s3"
 PROPERTIES
diff --git 
a/i18n/zh-CN/docusaurus-plugin-content-docs/version-3.0/admin-manual/auth/integrations/aws-authentication-and-authorization.md
 
b/i18n/zh-CN/docusaurus-plugin-content-docs/version-3.0/admin-manual/auth/integrations/aws-authentication-and-authorization.md
index 131323a67d0..a58b8d6eeb0 100644
--- 
a/i18n/zh-CN/docusaurus-plugin-content-docs/version-3.0/admin-manual/auth/integrations/aws-authentication-and-authorization.md
+++ 
b/i18n/zh-CN/docusaurus-plugin-content-docs/version-3.0/admin-manual/auth/integrations/aws-authentication-and-authorization.md
@@ -125,7 +125,7 @@ S3 Bucket写策略模板, 适用于需要读取、列出和写入bucket对象的
 
 完成上述Step1中的所有配置后,可获得`access_key`和`secret_key`访问密钥,通过访问密钥可以使用Doris对应的功能,具体例子如下:
 
-S3 Load
+#### S3 Load
 ```SQL
   LOAD LABEL s3_load_2022_04_01
   (
@@ -149,7 +149,7 @@ S3 Load
   );
 ```
 
-TVF
+#### TVF
 ```SQL
   SELECT * FROM S3 (
       'uri' = 's3://your_bucket/path/to/tvf_test/test.parquet',
@@ -161,7 +161,7 @@ TVF
   )
 ```
 
-External Catalog
+#### External Catalog
 ```SQL
   CREATE CATALOG iceberg_catalog PROPERTIES (
       'type' = 'iceberg',
@@ -174,7 +174,7 @@ External Catalog
   );
 ```
 
-Storage Vault
+#### Storage Vault
 ```SQL
 CREATE STORAGE VAULT IF NOT EXISTS s3_demo_vault
 PROPERTIES (
@@ -190,7 +190,7 @@ PROPERTIES (
 );
 ```
 
-Export
+#### Export
 ```SQL
 EXPORT TABLE s3_test TO "s3://your_bucket/a/b/c" 
 PROPERTIES (
@@ -204,7 +204,7 @@ PROPERTIES (
 )
 ```
 
-Repository
+#### Repository
 ```SQL
 CREATE REPOSITORY `s3_repo`
 WITH S3
@@ -218,7 +218,7 @@ PROPERTIES
 );
 ```
 
-Resource
+#### Resource
 ```SQL
 CREATE RESOURCE "remote_s3"
 PROPERTIES
@@ -391,7 +391,7 @@ S3 Bucket写策略模板, 适用于需要往bucket中读取和写入对象的Dor
 }
 ```
 
-#### Step4 通过`role_arn`和`external_id`字段使用Doris对应SQL功能
+### Step4 通过`role_arn`和`external_id`字段使用Doris对应SQL功能
 
 通过上述配置步骤完成assume role需要的权限配置后,可得到一个目标账户的`role_arn`信息和`external_id` (如有),
 
@@ -402,7 +402,7 @@ S3 Bucket写策略模板, 适用于需要往bucket中读取和写入对象的Dor
 "s3.external_id" = "<your-external-id>"      -- 可选参数
 ```
 
-S3 Load
+#### S3 Load
 ```SQL
   LOAD LABEL s3_load_2022_04_01
   (
@@ -426,7 +426,7 @@ S3 Load
   );
 ```
 
-TVF
+#### TVF
 ```SQL
   SELECT * FROM S3 (
       "uri" = "s3://your_bucket/path/to/tvf_test/test.parquet",
@@ -438,7 +438,7 @@ TVF
   )
 ```
 
-External Catalog
+#### External Catalog
 ```SQL
   CREATE CATALOG iceberg_catalog PROPERTIES (
       "type" = "iceberg",
@@ -451,7 +451,7 @@ External Catalog
   );
 ```
 
-Storage Vault
+#### Storage Vault
 ```SQL
 CREATE STORAGE VAULT IF NOT EXISTS s3_demo_vault
 PROPERTIES (
@@ -467,7 +467,7 @@ PROPERTIES (
 );
 ```
 
-Export
+#### Export
 ```SQL
 EXPORT TABLE s3_test TO "s3://your_bucket/a/b/c" 
 PROPERTIES (
@@ -481,7 +481,7 @@ PROPERTIES (
 )
 ```
 
-Repository
+#### Repository
 ```SQL
 CREATE REPOSITORY `s3_repo`
 WITH S3
@@ -495,7 +495,7 @@ PROPERTIES
 );
 ```
 
-Resource
+#### Resource
 ```SQL
 CREATE RESOURCE "remote_s3"
 PROPERTIES
diff --git 
a/versioned_docs/version-3.0/admin-manual/auth/integrations/aws-authentication-and-authorization.md
 
b/versioned_docs/version-3.0/admin-manual/auth/integrations/aws-authentication-and-authorization.md
index 6a3e76e31d2..71b71884c6a 100644
--- 
a/versioned_docs/version-3.0/admin-manual/auth/integrations/aws-authentication-and-authorization.md
+++ 
b/versioned_docs/version-3.0/admin-manual/auth/integrations/aws-authentication-and-authorization.md
@@ -32,7 +32,7 @@ Doris supports accessing AWS service resources through two 
authentication method
 
 Doris enables access to external data sources by configuring `AWS IAM User` 
credentials(equal to `access_key` and `secret_key`), below are the detailed 
configuration steps(for more information, refer to the AWS doc [IAM 
users](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users.html)):
 
-### Step1 create an IAM User and configure policies
+### Step1 Create an IAM User and configure policies
 
 1. Login to the `AWS Console` and create an `IAM User`​
 
@@ -125,7 +125,7 @@ S3 write policy template​​ (Applies to Doris features 
requiring read/write a
 
 After completing all configurations in Step 1, you will obtain `access_key` 
and `secret_key`. Use these credentials to access doris features as shown in 
the following examples:
 
-S3 Load
+#### S3 Load
 ```SQL
   LOAD LABEL s3_load_2022_04_01
   (
@@ -149,7 +149,7 @@ S3 Load
   );
 ```
 
-TVF
+#### TVF
 ```SQL
   SELECT * FROM S3 (
       'uri' = 's3://your_bucket/path/to/tvf_test/test.parquet',
@@ -161,7 +161,7 @@ TVF
   )
 ```
 
-External Catalog
+#### External Catalog
 ```SQL
   CREATE CATALOG iceberg_catalog PROPERTIES (
       'type' = 'iceberg',
@@ -174,7 +174,7 @@ External Catalog
   );
 ```
 
-Storage Vault
+#### Storage Vault
 ```SQL
 CREATE STORAGE VAULT IF NOT EXISTS s3_demo_vault
 PROPERTIES (
@@ -190,7 +190,7 @@ PROPERTIES (
 );
 ```
 
-Export
+#### Export
 ```SQL
 EXPORT TABLE s3_test TO "s3://your_bucket/a/b/c" 
 PROPERTIES (
@@ -204,7 +204,7 @@ PROPERTIES (
 )
 ```
 
-Repository
+#### Repository
 ```SQL
 CREATE REPOSITORY `s3_repo`
 WITH S3
@@ -218,7 +218,7 @@ PROPERTIES
 );
 ```
 
-Resource
+#### Resource
 ```SQL
 CREATE RESOURCE "remote_s3"
 PROPERTIES
@@ -391,7 +391,7 @@ S3 write policy template​​ (Applies to Doris features 
requiring read/write a
 }
 ```
 
-#### Step4 Use doris features with Assumed Role via SQL, according to 
`role_arn` and `external_id` fields;
+### Step4 Use doris features with Assumed Role via SQL, according to 
`role_arn` and `external_id` fields
 
 After completing the above configurations, obtain the target account's 
`role_arn` and `external_id` (if applicable). 
 Use these parameters in doris SQL statements as shown below:
@@ -402,7 +402,7 @@ Common important key parameters:​​
 "s3.external_id" = "<your-external-id>"      -- option parameter
 ```
 
-S3 Load
+#### S3 Load
 ```SQL
   LOAD LABEL s3_load_2022_04_01
   (
@@ -426,7 +426,7 @@ S3 Load
   );
 ```
 
-TVF
+#### TVF
 ```SQL
   SELECT * FROM S3 (
       "uri" = "s3://your_bucket/path/to/tvf_test/test.parquet",
@@ -438,7 +438,7 @@ TVF
   )
 ```
 
-External Catalog
+#### External Catalog
 ```SQL
   CREATE CATALOG iceberg_catalog PROPERTIES (
       "type" = "iceberg",
@@ -451,7 +451,7 @@ External Catalog
   );
 ```
 
-Storage Vault
+#### Storage Vault
 ```SQL
 CREATE STORAGE VAULT IF NOT EXISTS s3_demo_vault
 PROPERTIES (
@@ -467,7 +467,7 @@ PROPERTIES (
 );
 ```
 
-Export
+#### Export
 ```SQL
 EXPORT TABLE s3_test TO "s3://your_bucket/a/b/c" 
 PROPERTIES (
@@ -481,7 +481,7 @@ PROPERTIES (
 )
 ```
 
-Repository
+#### Repository
 ```SQL
 CREATE REPOSITORY `s3_repo`
 WITH S3
@@ -495,7 +495,7 @@ PROPERTIES
 );
 ```
 
-Resource
+#### Resource
 ```SQL
 CREATE RESOURCE "remote_s3"
 PROPERTIES


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to