This is an automated email from the ASF dual-hosted git repository.
dataroaring pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/doris-website.git
The following commit(s) were added to refs/heads/master by this push:
new 3a1f2e91683 [chore](iam role) Optimize the document format about aws
iam role (#2507)
3a1f2e91683 is described below
commit 3a1f2e91683e02e9512ee1678e18d0412ab37873
Author: Lei Zhang <[email protected]>
AuthorDate: Fri Jun 20 15:36:36 2025 +0800
[chore](iam role) Optimize the document format about aws iam role (#2507)
## Versions
- [x] dev
- [x] 3.0
- [ ] 2.1
- [ ] 2.0
## Languages
- [x] Chinese
- [x] English
## Docs Checklist
- [ ] Checked by AI
- [ ] Test Cases Built
---
.../aws-authentication-and-authorization.md | 32 +++++++++++-----------
.../aws-authentication-and-authorization.md | 30 ++++++++++----------
.../aws-authentication-and-authorization.md | 30 ++++++++++----------
.../aws-authentication-and-authorization.md | 32 +++++++++++-----------
4 files changed, 62 insertions(+), 62 deletions(-)
diff --git
a/docs/admin-manual/auth/integrations/aws-authentication-and-authorization.md
b/docs/admin-manual/auth/integrations/aws-authentication-and-authorization.md
index f5f208dd597..0b6af5d24d8 100644
---
a/docs/admin-manual/auth/integrations/aws-authentication-and-authorization.md
+++
b/docs/admin-manual/auth/integrations/aws-authentication-and-authorization.md
@@ -32,7 +32,7 @@ Doris supports accessing AWS service resources through two
authentication method
Doris enables access to external data sources by configuring `AWS IAM User`
credentials(equal to `access_key` and `secret_key`), below are the detailed
configuration steps(for more information, refer to the AWS doc [IAM
users](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users.html)):
-### Step1 create an IAM User and configure policies
+### Step1 Create an IAM User and configure policies
1. Login to the `AWS Console` and create an `IAM User`
@@ -125,7 +125,7 @@ S3 write policy template (Applies to Doris features
requiring read/write a
After completing all configurations in Step 1, you will obtain `access_key`
and `secret_key`. Use these credentials to access doris features as shown in
the following examples:
-S3 Load
+#### S3 Load
```SQL
LOAD LABEL s3_load_2022_04_01
(
@@ -149,7 +149,7 @@ S3 Load
);
```
-TVF
+#### TVF
```SQL
SELECT * FROM S3 (
'uri' = 's3://your_bucket/path/to/tvf_test/test.parquet',
@@ -161,7 +161,7 @@ TVF
)
```
-External Catalog
+#### External Catalog
```SQL
CREATE CATALOG iceberg_catalog PROPERTIES (
'type' = 'iceberg',
@@ -174,7 +174,7 @@ External Catalog
);
```
-Storage Vault
+#### Storage Vault
```SQL
CREATE STORAGE VAULT IF NOT EXISTS s3_demo_vault
PROPERTIES (
@@ -190,7 +190,7 @@ PROPERTIES (
);
```
-Export
+#### Export
```SQL
EXPORT TABLE s3_test TO "s3://your_bucket/a/b/c"
PROPERTIES (
@@ -204,7 +204,7 @@ PROPERTIES (
)
```
-Repository
+#### Repository
```SQL
CREATE REPOSITORY `s3_repo`
WITH S3
@@ -218,7 +218,7 @@ PROPERTIES
);
```
-Resource
+#### Resource
```SQL
CREATE RESOURCE "remote_s3"
PROPERTIES
@@ -391,7 +391,7 @@ S3 write policy template (Applies to Doris features
requiring read/write a
}
```
-#### Step4 Use doris features with Assumed Role via SQL, according to
`role_arn` and `external_id` fields;
+### Step4 Use doris features with Assumed Role via SQL, according to
`role_arn` and `external_id` fields
After completing the above configurations, obtain the target account's
`role_arn` and `external_id` (if applicable).
Use these parameters in doris SQL statements as shown below:
@@ -402,7 +402,7 @@ Common important key parameters:
"s3.external_id" = "<your-external-id>" -- option parameter
```
-S3 Load
+#### S3 Load
```SQL
LOAD LABEL s3_load_2022_04_01
(
@@ -426,7 +426,7 @@ S3 Load
);
```
-TVF
+#### TVF
```SQL
SELECT * FROM S3 (
"uri" = "s3://your_bucket/path/to/tvf_test/test.parquet",
@@ -438,7 +438,7 @@ TVF
)
```
-External Catalog
+#### External Catalog
```SQL
CREATE CATALOG iceberg_catalog PROPERTIES (
"type" = "iceberg",
@@ -451,7 +451,7 @@ External Catalog
);
```
-Storage Vault
+#### Storage Vault
```SQL
CREATE STORAGE VAULT IF NOT EXISTS s3_demo_vault
PROPERTIES (
@@ -467,7 +467,7 @@ PROPERTIES (
);
```
-Export
+#### Export
```SQL
EXPORT TABLE s3_test TO "s3://your_bucket/a/b/c"
PROPERTIES (
@@ -481,7 +481,7 @@ PROPERTIES (
)
```
-Repository
+#### Repository
```SQL
CREATE REPOSITORY `s3_repo`
WITH S3
@@ -495,7 +495,7 @@ PROPERTIES
);
```
-Resource
+#### Resource
```SQL
CREATE RESOURCE "remote_s3"
PROPERTIES
diff --git
a/i18n/zh-CN/docusaurus-plugin-content-docs/current/admin-manual/auth/integrations/aws-authentication-and-authorization.md
b/i18n/zh-CN/docusaurus-plugin-content-docs/current/admin-manual/auth/integrations/aws-authentication-and-authorization.md
index 02f4e696109..96740832388 100644
---
a/i18n/zh-CN/docusaurus-plugin-content-docs/current/admin-manual/auth/integrations/aws-authentication-and-authorization.md
+++
b/i18n/zh-CN/docusaurus-plugin-content-docs/current/admin-manual/auth/integrations/aws-authentication-and-authorization.md
@@ -125,7 +125,7 @@ S3 Bucket写策略模板, 适用于需要读取、列出和写入bucket对象的
完成上述Step1中的所有配置后,可获得`access_key`和`secret_key`访问密钥,通过访问密钥可以使用Doris对应的功能,具体例子如下:
-S3 Load
+#### S3 Load
```SQL
LOAD LABEL s3_load_2022_04_01
(
@@ -149,7 +149,7 @@ S3 Load
);
```
-TVF
+#### TVF
```SQL
SELECT * FROM S3 (
'uri' = 's3://your_bucket/path/to/tvf_test/test.parquet',
@@ -161,7 +161,7 @@ TVF
)
```
-External Catalog
+#### External Catalog
```SQL
CREATE CATALOG iceberg_catalog PROPERTIES (
'type' = 'iceberg',
@@ -174,7 +174,7 @@ External Catalog
);
```
-Storage Vault
+#### Storage Vault
```SQL
CREATE STORAGE VAULT IF NOT EXISTS s3_demo_vault
PROPERTIES (
@@ -190,7 +190,7 @@ PROPERTIES (
);
```
-Export
+#### Export
```SQL
EXPORT TABLE s3_test TO "s3://your_bucket/a/b/c"
PROPERTIES (
@@ -204,7 +204,7 @@ PROPERTIES (
)
```
-Repository
+#### Repository
```SQL
CREATE REPOSITORY `s3_repo`
WITH S3
@@ -218,7 +218,7 @@ PROPERTIES
);
```
-Resource
+#### Resource
```SQL
CREATE RESOURCE "remote_s3"
PROPERTIES
@@ -391,7 +391,7 @@ S3 Bucket写策略模板, 适用于需要往bucket中读取和写入对象的Dor
}
```
-#### Step4 通过`role_arn`和`external_id`字段使用Doris对应SQL功能
+### Step4 通过`role_arn`和`external_id`字段使用Doris对应SQL功能
通过上述配置步骤完成assume role需要的权限配置后,可得到一个目标账户的`role_arn`信息和`external_id` (如有),
@@ -402,7 +402,7 @@ S3 Bucket写策略模板, 适用于需要往bucket中读取和写入对象的Dor
"s3.external_id" = "<your-external-id>" -- 可选参数
```
-S3 Load
+#### S3 Load
```SQL
LOAD LABEL s3_load_2022_04_01
(
@@ -426,7 +426,7 @@ S3 Load
);
```
-TVF
+#### TVF
```SQL
SELECT * FROM S3 (
"uri" = "s3://your_bucket/path/to/tvf_test/test.parquet",
@@ -438,7 +438,7 @@ TVF
)
```
-External Catalog
+#### External Catalog
```SQL
CREATE CATALOG iceberg_catalog PROPERTIES (
"type" = "iceberg",
@@ -451,7 +451,7 @@ External Catalog
);
```
-Storage Vault
+#### Storage Vault
```SQL
CREATE STORAGE VAULT IF NOT EXISTS s3_demo_vault
PROPERTIES (
@@ -467,7 +467,7 @@ PROPERTIES (
);
```
-Export
+#### Export
```SQL
EXPORT TABLE s3_test TO "s3://your_bucket/a/b/c"
PROPERTIES (
@@ -481,7 +481,7 @@ PROPERTIES (
)
```
-Repository
+#### Repository
```SQL
CREATE REPOSITORY `s3_repo`
WITH S3
@@ -495,7 +495,7 @@ PROPERTIES
);
```
-Resource
+#### Resource
```SQL
CREATE RESOURCE "remote_s3"
PROPERTIES
diff --git
a/i18n/zh-CN/docusaurus-plugin-content-docs/version-3.0/admin-manual/auth/integrations/aws-authentication-and-authorization.md
b/i18n/zh-CN/docusaurus-plugin-content-docs/version-3.0/admin-manual/auth/integrations/aws-authentication-and-authorization.md
index 131323a67d0..a58b8d6eeb0 100644
---
a/i18n/zh-CN/docusaurus-plugin-content-docs/version-3.0/admin-manual/auth/integrations/aws-authentication-and-authorization.md
+++
b/i18n/zh-CN/docusaurus-plugin-content-docs/version-3.0/admin-manual/auth/integrations/aws-authentication-and-authorization.md
@@ -125,7 +125,7 @@ S3 Bucket写策略模板, 适用于需要读取、列出和写入bucket对象的
完成上述Step1中的所有配置后,可获得`access_key`和`secret_key`访问密钥,通过访问密钥可以使用Doris对应的功能,具体例子如下:
-S3 Load
+#### S3 Load
```SQL
LOAD LABEL s3_load_2022_04_01
(
@@ -149,7 +149,7 @@ S3 Load
);
```
-TVF
+#### TVF
```SQL
SELECT * FROM S3 (
'uri' = 's3://your_bucket/path/to/tvf_test/test.parquet',
@@ -161,7 +161,7 @@ TVF
)
```
-External Catalog
+#### External Catalog
```SQL
CREATE CATALOG iceberg_catalog PROPERTIES (
'type' = 'iceberg',
@@ -174,7 +174,7 @@ External Catalog
);
```
-Storage Vault
+#### Storage Vault
```SQL
CREATE STORAGE VAULT IF NOT EXISTS s3_demo_vault
PROPERTIES (
@@ -190,7 +190,7 @@ PROPERTIES (
);
```
-Export
+#### Export
```SQL
EXPORT TABLE s3_test TO "s3://your_bucket/a/b/c"
PROPERTIES (
@@ -204,7 +204,7 @@ PROPERTIES (
)
```
-Repository
+#### Repository
```SQL
CREATE REPOSITORY `s3_repo`
WITH S3
@@ -218,7 +218,7 @@ PROPERTIES
);
```
-Resource
+#### Resource
```SQL
CREATE RESOURCE "remote_s3"
PROPERTIES
@@ -391,7 +391,7 @@ S3 Bucket写策略模板, 适用于需要往bucket中读取和写入对象的Dor
}
```
-#### Step4 通过`role_arn`和`external_id`字段使用Doris对应SQL功能
+### Step4 通过`role_arn`和`external_id`字段使用Doris对应SQL功能
通过上述配置步骤完成assume role需要的权限配置后,可得到一个目标账户的`role_arn`信息和`external_id` (如有),
@@ -402,7 +402,7 @@ S3 Bucket写策略模板, 适用于需要往bucket中读取和写入对象的Dor
"s3.external_id" = "<your-external-id>" -- 可选参数
```
-S3 Load
+#### S3 Load
```SQL
LOAD LABEL s3_load_2022_04_01
(
@@ -426,7 +426,7 @@ S3 Load
);
```
-TVF
+#### TVF
```SQL
SELECT * FROM S3 (
"uri" = "s3://your_bucket/path/to/tvf_test/test.parquet",
@@ -438,7 +438,7 @@ TVF
)
```
-External Catalog
+#### External Catalog
```SQL
CREATE CATALOG iceberg_catalog PROPERTIES (
"type" = "iceberg",
@@ -451,7 +451,7 @@ External Catalog
);
```
-Storage Vault
+#### Storage Vault
```SQL
CREATE STORAGE VAULT IF NOT EXISTS s3_demo_vault
PROPERTIES (
@@ -467,7 +467,7 @@ PROPERTIES (
);
```
-Export
+#### Export
```SQL
EXPORT TABLE s3_test TO "s3://your_bucket/a/b/c"
PROPERTIES (
@@ -481,7 +481,7 @@ PROPERTIES (
)
```
-Repository
+#### Repository
```SQL
CREATE REPOSITORY `s3_repo`
WITH S3
@@ -495,7 +495,7 @@ PROPERTIES
);
```
-Resource
+#### Resource
```SQL
CREATE RESOURCE "remote_s3"
PROPERTIES
diff --git
a/versioned_docs/version-3.0/admin-manual/auth/integrations/aws-authentication-and-authorization.md
b/versioned_docs/version-3.0/admin-manual/auth/integrations/aws-authentication-and-authorization.md
index 6a3e76e31d2..71b71884c6a 100644
---
a/versioned_docs/version-3.0/admin-manual/auth/integrations/aws-authentication-and-authorization.md
+++
b/versioned_docs/version-3.0/admin-manual/auth/integrations/aws-authentication-and-authorization.md
@@ -32,7 +32,7 @@ Doris supports accessing AWS service resources through two
authentication method
Doris enables access to external data sources by configuring `AWS IAM User`
credentials(equal to `access_key` and `secret_key`), below are the detailed
configuration steps(for more information, refer to the AWS doc [IAM
users](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users.html)):
-### Step1 create an IAM User and configure policies
+### Step1 Create an IAM User and configure policies
1. Login to the `AWS Console` and create an `IAM User`
@@ -125,7 +125,7 @@ S3 write policy template (Applies to Doris features
requiring read/write a
After completing all configurations in Step 1, you will obtain `access_key`
and `secret_key`. Use these credentials to access doris features as shown in
the following examples:
-S3 Load
+#### S3 Load
```SQL
LOAD LABEL s3_load_2022_04_01
(
@@ -149,7 +149,7 @@ S3 Load
);
```
-TVF
+#### TVF
```SQL
SELECT * FROM S3 (
'uri' = 's3://your_bucket/path/to/tvf_test/test.parquet',
@@ -161,7 +161,7 @@ TVF
)
```
-External Catalog
+#### External Catalog
```SQL
CREATE CATALOG iceberg_catalog PROPERTIES (
'type' = 'iceberg',
@@ -174,7 +174,7 @@ External Catalog
);
```
-Storage Vault
+#### Storage Vault
```SQL
CREATE STORAGE VAULT IF NOT EXISTS s3_demo_vault
PROPERTIES (
@@ -190,7 +190,7 @@ PROPERTIES (
);
```
-Export
+#### Export
```SQL
EXPORT TABLE s3_test TO "s3://your_bucket/a/b/c"
PROPERTIES (
@@ -204,7 +204,7 @@ PROPERTIES (
)
```
-Repository
+#### Repository
```SQL
CREATE REPOSITORY `s3_repo`
WITH S3
@@ -218,7 +218,7 @@ PROPERTIES
);
```
-Resource
+#### Resource
```SQL
CREATE RESOURCE "remote_s3"
PROPERTIES
@@ -391,7 +391,7 @@ S3 write policy template (Applies to Doris features
requiring read/write a
}
```
-#### Step4 Use doris features with Assumed Role via SQL, according to
`role_arn` and `external_id` fields;
+### Step4 Use doris features with Assumed Role via SQL, according to
`role_arn` and `external_id` fields
After completing the above configurations, obtain the target account's
`role_arn` and `external_id` (if applicable).
Use these parameters in doris SQL statements as shown below:
@@ -402,7 +402,7 @@ Common important key parameters:
"s3.external_id" = "<your-external-id>" -- option parameter
```
-S3 Load
+#### S3 Load
```SQL
LOAD LABEL s3_load_2022_04_01
(
@@ -426,7 +426,7 @@ S3 Load
);
```
-TVF
+#### TVF
```SQL
SELECT * FROM S3 (
"uri" = "s3://your_bucket/path/to/tvf_test/test.parquet",
@@ -438,7 +438,7 @@ TVF
)
```
-External Catalog
+#### External Catalog
```SQL
CREATE CATALOG iceberg_catalog PROPERTIES (
"type" = "iceberg",
@@ -451,7 +451,7 @@ External Catalog
);
```
-Storage Vault
+#### Storage Vault
```SQL
CREATE STORAGE VAULT IF NOT EXISTS s3_demo_vault
PROPERTIES (
@@ -467,7 +467,7 @@ PROPERTIES (
);
```
-Export
+#### Export
```SQL
EXPORT TABLE s3_test TO "s3://your_bucket/a/b/c"
PROPERTIES (
@@ -481,7 +481,7 @@ PROPERTIES (
)
```
-Repository
+#### Repository
```SQL
CREATE REPOSITORY `s3_repo`
WITH S3
@@ -495,7 +495,7 @@ PROPERTIES
);
```
-Resource
+#### Resource
```SQL
CREATE RESOURCE "remote_s3"
PROPERTIES
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]