You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/connections/destinations/catalog/actions-google-enhanced-conversions/index.md
+11-12Lines changed: 11 additions & 12 deletions
Original file line number
Diff line number
Diff line change
@@ -46,20 +46,19 @@ Actions define which events Segment sends to Google Enhanced Conversions, and th
46
46
2. Click **Add Subscription**, and select **Post Conversion**.
47
47
3. Configure the **Event Trigger**. For example, you can trigger the action whenever the source sends an Event named `Purchase`. Click **Continue** to configure the action fields, skip Testing for now. 
48
48
4. Enter the Conversion Label. Find it using the instructions in the article [Google Ads conversions](https://support.google.com/tagmanager/answer/6105160?hl=en){:target="_blank"}.
49
-
5. Configure the remaining properties. The **Email** field is not editable. In the default configuration, `properties.email` maps to the Email property in Google Enhanced Conversions. If `properties.email` is unavailable, the destination uses `traits.email` as a fallback.
49
+
5. Configure the remaining properties.
50
50
6. When you're finished editing the action fields, click **Continue**. Click **Save**.
51
51
7. To test your action, expand the **Test event trigger** section. Segment searches for recent events that match the trigger conditions. If there are no recent events that match the criteria, click **manually enter an event**, and replace the default event data with the following:
52
52
```json
53
53
{
54
-
"messageId": "segment-test-message-hkz2b",
55
-
"timestamp": "2021-08-27T17:32:12.781Z",
54
+
"messageId": "segment-test-message-hkz2b",
55
+
"timestamp": "2021-08-27T17:32:12.781Z",
56
56
"context" : {
57
57
"userAgent": "Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1"
Copy file name to clipboardExpand all lines: src/connections/storage/catalog/aws-s3/index.md
+98-8Lines changed: 98 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -5,9 +5,6 @@ redirect_from:
5
5
hide-personas-partial: true
6
6
---
7
7
8
-
> info "This document is about a destination which is in beta"
9
-
> This means that the AWS S3 with IAM Role Support destination is in active development, and some functionality may change before it becomes generally available.
10
-
11
8
12
9
## Differences between the Amazon S3 destination and the AWS S3 destination
13
10
@@ -34,9 +31,9 @@ The Segment Tracking API processes data from your sources, and collects the Even
34
31
35
32
## Create a new destination
36
33
37
-
Complete the following steps to configure the AWS S3 Destination with IAM Role Support.
34
+
Complete either [Create an IAM role in the AWS console](#create-an-iam-role-in-the-aws-console) or [Create an IAM role using the AWS CLI](#create-an-iam-role-using-the-aws-cli) to configure the AWS S3 Destination with IAM Role Support.
38
35
39
-
### Create an IAM role in AWS
36
+
### Create an IAM role in the AWS console
40
37
41
38
To complete this section, you need access to your AWS dashboard.
42
39
@@ -94,12 +91,105 @@ To complete this section, you need access to your AWS dashboard.
94
91
],
95
92
"Resource": "<YOUR_KEY_ARN>"
96
93
}
97
-
]
94
+
]
98
95
}
99
96
```
100
97
101
98
If you have server-side encryption enabled, see the [required configuration](#encryption).
102
99
100
+
### Create an IAM role using the AWS CLI
101
+
102
+
To create an IAM role with external ID and with S3 permissions using the AWS CLI, follow the steps below.
103
+
104
+
#### Prerequisites
105
+
To create an S3 IAM role, you must first install and configure the AWS CLI on your local machine and create an S3 bucket. Refer to Amazon's documentation, [Getting started with the AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html){:target="_blank"} for more information.
106
+
107
+
#### Procedure
108
+
1. Copy the following code snippet and save it as a file on your local machine titled `trust-relationship-policy.json`. Replace `<YOUR_WORKSPACE_ID>` with your Segment workspace ID.
2. Navigate to the folder containing `trust-relationship-policy.json` and run the following command to create your IAM role and attach the trust relationship document, replacing `<YOUR_ROLE_NAME>` with the name you want to give this IAM role:
132
+
133
+
``` python
134
+
aws iam create-role --role-name <YOUR_ROLE_NAME> --assume-role-policy-document file://trust-relationship-policy.json --description "IAM role for Segment to assume (AWS S3 destination)"
135
+
```
136
+
137
+
3. To verify that the IAM role is created, log into the AWS console and open the IAM Management Console. Under the Trust Relationship tab, there should be a key-value pair: a `sts:ExternalID` key with a value of `your Segment workspace ID`.
138
+
139
+
4. Copy the following IAM policy, replacing `<YOUR_BUCKET_NAME>` with the name of your S3 bucket, and save it as a file on your local machine titled `iam-policy.json`.
7. Run the following command to attach the IAM policy to the IAM role, replacing `<YOUR_ROLE_NAME>` with the name of your role and `<ARN_FROM_STEP_6_OUTPUT>` with the Arn output from the last step:
185
+
186
+
``` python
187
+
aws iam attach-role-policy --role-name <YOUR_ROLE_NAME> --policy-arn <ARN_FROM_STEP_6_OUTPUT>
188
+
```
189
+
190
+
> info ""
191
+
> To verify that the IAM role is created, navigate to the AWS console and open the IAM Management Console. On the Permissions tab, verify that there is a `segment-s3-putobject` Permissions policy.
192
+
103
193
104
194
### Add the AWS S3 with IAM Role Support Destination
105
195
@@ -126,7 +216,7 @@ To finish configuration, enable the AWS S3 Destination with IAM Role Support des
126
216
127
217
To migrate an existing Amazon S3 destination to the AWS S3 with IAM Role Support Destination:
128
218
129
-
1. Configure the IAM role and IAM policy permissions as described in steps 2 - 4 [above](#create-an-iam-role-in-aws).
219
+
1. Configure the IAM role and IAM policy permissions as described in steps 2 - 4 [above](#create-an-iam-role-in-the-aws-console).
130
220
2. Add the AWS S3 with IAM Role Support Destination and add the AWS Region and IAM role ARN. For the bucket name, enter `<YOUR_BUCKET_NAME>/segment-logs/test`. Enable the destination, and verify data is received at `<YOUR_BUCKET_NAME>/segment-logs/test/segment-logs`. If the folder receives data, continue to the next step. If you don't see log entries, check the trust relationship document and IAM policy attached to the role.
131
221
3. Update the bucket name in the new destination to `<YOUR_BUCKET_NAME>`.
132
222
4. After 1 hour, disable the original Amazon S3 destination.
@@ -158,7 +248,7 @@ Segment groups logs by day, and names them using the following format:
The received-day refers to the UTC date unix timestamp, that the API receives the file, which makes it easy to find all calls received within a certain timeframe.
251
+
The received-day refers to the UTC date Unix timestamp, that the API receives the file, which makes it easy to find all calls received within a certain timeframe.
The Google Cloud Storage (GCS) destination puts the raw logs of the data Segment receives into your GCS bucket. The data is copied into your bucket at least every hour. You might see multiple files over a period of time depending on how much data is copied.
11
11
12
-
Keep in mind that GCS works differently from most of our destinations. Using a destinations selector like the [integrations object](https://segment.com/docs/connections/spec/common/#integrations) does not affect events in the case of GCS.
12
+
> warning ""
13
+
> The Google Cloud Storage destination works differently than other destinations in Segment. Segment sends **all** data from a Personas source to GCS during the sync process, not only the connected audiences and traits. Using a destinations selector like the [integrations object](/docs/connections/spec/common/#integrations) doesn't affect the events events sent to GCS.
13
14
14
15
**Note**: The GCS destination is currently in beta, and does not support product features such as deletions, replays, or surfacing errors in the UI.
Copy file name to clipboardExpand all lines: src/connections/storage/data-lakes/sync-history.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ To access the Sync History page from the Segment app, open the **My Destinations
23
23
## Health
24
24
The health tab provides an overview of the rows that synced to your data lake both today and each day for the last 30 days.
25
25
26
-
The bar chart, 'Daily Synced Rows,' shows an overview of the rows synced for each of the last 30 days. Hovering over a date shows the number of rows that were synced for that day. Selecting a date from the bar chart opens the Daily Row Volume table, which provides a breakdown of which collections synced, how many rows from each collection synced, and the percentage of all synced rows from each collection.
26
+
The bar chart, 'Daily Synced Rows,' shows an overview of the rows synced for each of the last 30 days. Hovering over a date shows the number of rows that were synced for that day. Selecting a date from the bar chart opens the Daily Row Volume table, which provides a breakdown of which collections synced, how many rows from each collection synced, and the percentage of all synced rows from each collection.
27
27
28
28
The Daily Row Volume table contains the following information:
29
29
***Collections:** The name of each collection of properties synced to the data lake
0 commit comments