Skip to content

Commit ea6173f

Browse files
authored
Fix placeholder names in Kinesis log docs (#25563)
STEAM_NAME should be STREAM_NAME. YOUR_AWS_ACCOUNT_ID is used elsewhere on the page.
1 parent b2a775c commit ea6173f

File tree

1 file changed

+3
-3
lines changed
  • src/content/docs/logs/logpush/logpush-job/enable-destinations

1 file changed

+3
-3
lines changed

src/content/docs/logs/logpush/logpush-job/enable-destinations/kinesis.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,13 +46,13 @@ Logpush supports [Amazon Kinesis](https://aws.amazon.com/kinesis/) as a destinat
4646
3. Create a Logpush job, using the following format for the `destination_conf` field:
4747

4848
```bash
49-
kinesis://<STEAM_NAME>?region=<AWS_REGION>&sts-assume-role-arn=arn:aws:iam::<YOUR_AWS_ACCOUNT_NUMBER>:role/<IAM_ROLE_NAME>
49+
kinesis://<STREAM_NAME>?region=<AWS_REGION>&sts-assume-role-arn=arn:aws:iam::<YOUR_AWS_ACCOUNT_ID>:role/<IAM_ROLE_NAME>
5050
```
5151

5252
4. (optional) When using STS Assume Role, you can include `sts-external-id` as a `destination_conf` parameter so it is included in your Logpush job's requests to Kinesis. Refer to [Securely Using External ID for Accessing AWS Accounts Owned by Others](https://aws.amazon.com/blogs/apn/securely-using-external-id-for-accessing-aws-accounts-owned-by-others/) for more information.
5353

5454
```bash
55-
kinesis://<STEAM_NAME>?region=<AWS_REGION>&sts-assume-role-arn=arn:aws:iam::<YOUR_AWS_ACCOUNT_NUMBER>:role/<IAM_ROLE_NAME>&sts-external-id=<EXTERNAL_ID>
55+
kinesis://<STREAM_NAME>?region=<AWS_REGION>&sts-assume-role-arn=arn:aws:iam::<YOUR_AWS_ACCOUNT_ID>:role/<IAM_ROLE_NAME>&sts-external-id=<EXTERNAL_ID>
5656
```
5757

5858
### STS Assume Role example
@@ -62,7 +62,7 @@ $ curl https://api.cloudflare.com/client/v4/zones/$ZONE_TAG/logpush/jobs \
6262
-H 'Authorization: Bearer <API_TOKEN>' \
6363
-H 'Content-Type: application/json' -d '{
6464
"name": "kinesis",
65-
"destination_conf": "kinesis://<STEAM_NAME>?region=<AWS_REGION>&sts-assume-role-arn=arn:aws:iam::<YOUR_AWS_ACCOUNT_NUMBER>:role/<IAM_ROLE_NAME>",
65+
"destination_conf": "kinesis://<STREAM_NAME>?region=<AWS_REGION>&sts-assume-role-arn=arn:aws:iam::<YOUR_AWS_ACCOUNT_ID>:role/<IAM_ROLE_NAME>",
6666
"dataset": "http_requests",
6767
"enabled": true
6868
}'

0 commit comments

Comments
 (0)