From 07b32f00258ba8e39611dcbac33b6c1e4c30860b Mon Sep 17 00:00:00 2001 From: Dale Mcdiarmid Date: Tue, 17 Dec 2024 14:25:51 +0000 Subject: [PATCH] note required role name --- docs/en/cloud/security/accessing-s3-data-securely.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/en/cloud/security/accessing-s3-data-securely.md b/docs/en/cloud/security/accessing-s3-data-securely.md index abc2dec01f6..5e1de27aad1 100644 --- a/docs/en/cloud/security/accessing-s3-data-securely.md +++ b/docs/en/cloud/security/accessing-s3-data-securely.md @@ -71,7 +71,7 @@ This approach allows customers to manage all access to their S3 buckets in a sin 2 - Browse to IAM Service Console -3 - Create a new IAM role with the following IAM & Trust policy. +3 - Create a new IAM role with the following IAM & Trust policy. **Note: the role name must start with `ClickHouseAccessRole-` e.g. `arn:aws:iam::0123456789012:role/ClickHouseAccessRole-abc`.** Trust policy (Please replace {ClickHouse_IAM_ARN} with the IAM Role arn belong to your ClickHouse instance):