You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@kylin.apache.org by ya...@apache.org on 2022/04/07 09:37:06 UTC

[kylin] branch kylin4_on_cloud updated: fix (#1852)

This is an automated email from the ASF dual-hosted git repository.

yaqian pushed a commit to branch kylin4_on_cloud
in repository https://gitbox.apache.org/repos/asf/kylin.git


The following commit(s) were added to refs/heads/kylin4_on_cloud by this push:
     new 2a07649916 fix (#1852)
2a07649916 is described below

commit 2a07649916a73e8cdaea06b863ce4847ffa69929
Author: Yaqian Zhang <59...@qq.com>
AuthorDate: Thu Apr 7 17:37:01 2022 +0800

    fix (#1852)
---
 images/check_user_permission.png | Bin 210813 -> 262412 bytes
 readme/prerequisites.md          |  10 +++++-----
 2 files changed, 5 insertions(+), 5 deletions(-)

diff --git a/images/check_user_permission.png b/images/check_user_permission.png
index cac2d46e6b..cd4c67cbca 100644
Binary files a/images/check_user_permission.png and b/images/check_user_permission.png differ
diff --git a/readme/prerequisites.md b/readme/prerequisites.md
index f014f17c56..7d4ad0eeab 100644
--- a/readme/prerequisites.md
+++ b/readme/prerequisites.md
@@ -1,12 +1,12 @@
 ## Prerequisites
 
-### I. Create `user` and add permission
+### I. Check user permission
 
-#### 1. Create a `user` in AWS IAM service
+#### 1. Login AWS account and check whether the current user has sufficient permissions in AWS IAM service
 
-![create user](../images/create_user.png)
+![check user permission](../images/check_user_permission.png)              |
 
-#### 2. Add permission for user
+#### 2. Add permission for current user
 
 Users need the following permissions to ensure that subsequent operations can proceed smoothly:
 
@@ -163,7 +163,7 @@ If there is a problem with the `JSON` here, you can manually add permissions in
 
 ![review policy](../images/review_create_policy.png)
 
-###### 5. Add the permission policy you just created to your user:
+###### 5. Add the permission policy to current user:
 
 ![add permission](../images/check_user_permission.png)