You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/connections/destinations/catalog/amazon-kinesis-firehose/index.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -183,9 +183,9 @@ If you have many sources using Kinesis that it's impractical to attach all of th
183
183
To set this value for a single Secret ID:
184
184
1. Go to the Kinesis Firehose destination settings from each of your Segment sources.
185
185
2. Click **Secret ID** and enter your Workspace ID.
186
-
***NOTE:** For security purposes, Segment recommends you to use your Workspace ID as your Secret ID. If you’re currently using a Secret ID different from your Workspace ID, you’ll be susceptible to attacks. You can find your Workspace ID by going to: **Settings > Workspace Settings > ID**.
187
-
3. Once all of your sources have been updated to use this value, find the IAM role you created for this destination in the AWS Console in **Services > IAM > Roles**.
188
-
4.Click on the role and navigate to the **Trust Relationships** tab.
186
+
***NOTE:** For security purposes, Segment recommends you to use your Segment Workspace ID as your Secret ID. If you’re using a Secret ID different from your Workspace ID, you're susceptible to attacks. You can find your Workspace ID by going to: **Settings > Workspace Settings > ID** from the Segment dashboard.
187
+
3. Once all of your sources are updated to use this value, find the IAM role you created for this destination in the AWS Console in **Services > IAM > Roles**.
188
+
4.Select the role and navigate to the **Trust Relationships** tab.
189
189
5. Click **Edit trust relationship**. You should see a snippet that looks something that looks like this:
190
190
191
191
```json
@@ -207,4 +207,4 @@ To set this value for a single Secret ID:
207
207
]
208
208
}
209
209
```
210
-
6. Replace your Source ID (found at "YOUR_SEGMENT_SOURCE_ID") with your Secret ID.
210
+
6. Replace the value of `sts:ExternalId` ( "YOUR_SEGMENT_SOURCE_ID") with the Secret ID / Workspace ID value from the previous step.
Copy file name to clipboardExpand all lines: src/connections/destinations/catalog/amazon-lambda/index.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,7 +59,7 @@ There are two options for setting up the IAM policy and role:
59
59
60
60
Using CloudFormation minimizes the setup steps needed, and is Segment's recommended way to create your Lambda's policy and role. To use CloudFormation:
61
61
1. Create the CloudFormation Template.
62
-
1. Copy or download the [SegmentLambdaDestinationCFTemplate](https://github.com/segmentio/segment-lambda-recipes/blob/ead6c0f77deb38cea7ed486a7b98b47207796b5c/SegmentLambdaDestinationCFTemplate#L1) from the [segment-lambda-recipes](https://github.com/segmentio/segment-lambda-recipes) GitHub repo.
62
+
1. Copy or download the [SegmentLambdaDestinationCFTemplate](https://github.com/segmentio/segment-lambda-recipes/blob/ead6c0f77deb38cea7ed486a7b98b47207796b5c/SegmentLambdaDestinationCFTemplate#L1){:target="_blank"} from the [segment-lambda-recipes](https://github.com/segmentio/segment-lambda-recipes){:target="_blank"} GitHub repo.
63
63
2. Save the file with a name you like, but make sure it doesn't have a file extension.
64
64
2. Create the CloudFormation stack.
65
65
1. Within the AWS Console, navigate to **CloudFormation > Stacks**.
@@ -94,7 +94,7 @@ Using CloudFormation minimizes the setup steps needed, and is Segment's recommen
94
94
95
95

96
96
97
-
13. Click on the **Physical ID** of the role. You will be redirected to the summary page for the role within the IAM console.
97
+
13. Click the **Physical ID** of the role. You will be redirected to the summary page for the role within the IAM console.
98
98
14. Copy the **Role ARN** and copy it into the **Role Address** setting in your Segment Lambda destination settings.
99
99
100
100
Using the examples provided, your Segment Lambda destination settings will look something like this:
Copy file name to clipboardExpand all lines: src/connections/destinations/catalog/amazon-personalize/index.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ There are a few pre-requisites before getting started. They are:
22
22
3. Ability to deploy Lambda functions in Amazon Web Services
23
23
4. Access to AWS Personalize
24
24
25
-
If you don't have an S3, Redshift warehouse, or Snowflake warehouse set up, you can read more about setting up [S3](https://segment.com/docs/connections/storage/catalog/amazon-s3/), [Redshift](https://segment.com/docs/connections/storage/catalog/redshift/), and [Snowflake](https://segment.com/docs/connections/storage/catalog/snowflake/).
25
+
If you don't have S3, Redshift warehouse, or Snowflake warehouse configured, you can read more about setting up [S3](/docs/connections/storage/catalog/amazon-s3/), [Redshift](/docs/connections/storage/catalog/redshift/), and [Snowflake](/docs/connections/storage/catalog/snowflake/).
26
26
27
27
***If you're a Segment business tier customer, contact your Success contact to initiate a replay to S3 or your Warehouse.***
28
28
@@ -645,7 +645,7 @@ In the next section, we will build a real-time clickstream ingestion pipeline th
645
645
646
646
## Getting Recommendations and Live Event Updates
647
647
648
-
Once you deploy your Personalize solution and enable a Campaign, your Lambda can consume event notifications from Segment and use the Solution and Campaign to react to events which will drive your business cases.
648
+
Once you deploy your Personalize solution and enable a Campaign, your Lambda instance consumes event notifications from Segment and use the Solution and Campaign to react to events which drive your business cases.
649
649
650
650
The example code Segment provides below shows how to forward events to the Personalize Solution you deployed to keep your model updated. It then forwards an `identify` event back to Segment with the recommendations from your Solution.
651
651
@@ -656,9 +656,9 @@ Segment will need to be able to call ("invoke") your Lambda in order to process
656
656
657
657
#### Create an IAM policy
658
658
To create an IAM policy:
659
-
1. Sign in to the [Identity and Access Management (IAM) console](https://console.aws.amazon.com/iam/)and follow these instructions to [Create an IAM policy](http://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_create.html) to allow Segment permission to invoke your Lambda function.
659
+
1. Sign in to the [Identity and Access Management (IAM) console](https://console.aws.amazon.com/iam/){:target="_blank"} and follow these instructions to [Create an IAM policy](http://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_create.html){:target="_blank"} to allow Segment permission to invoke your Lambda function.
660
660
661
-
2. Select the **Create Policy from JSON** option and use the following template policy in the `Policy Document` field. Be sure to change the `{region}`, `{account-id}` and `{function-names}` with the applicable values. Here's example of a Lambda ARN `arn:aws:lambda:us-west-2:355207333203:function:``my-example-function`.
661
+
2. Select **Create Policy from JSON** and use the following template policy in the `Policy Document` field. Be sure to change the `{region}`, `{account-id}` and `{function-names}` with the applicable values. Here's example of a Lambda ARN `arn:aws:lambda:us-west-2:355207333203:function:``my-example-function`.
662
662
663
663
> note ""
664
664
> **NOTE:** You can put in a placeholder ARN for now, as you will need to come back to this step to update with the ARN of your Lambda once that's been created.
@@ -685,10 +685,10 @@ To create an IAM policy:
685
685
686
686
#### Create an IAM role
687
687
To create an IAM role:
688
-
1. Sign in to the [Identity and Access Management (IAM) console](https://console.aws.amazon.com/iam/) and follow these instructions to [Create an IAM role](http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html#roles-creatingrole-user-console) to allow Segment permission to invoke your Lambda function.
688
+
1. Sign in to the [Identity and Access Management (IAM) console](https://console.aws.amazon.com/iam/){:target="_blank"} and follow these instructions to [Create an IAM role](http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html#roles-creatingrole-user-console){:target="_blank"} to allow Segment permission to invoke your Lambda function.
689
689
2. While setting up the new role, add the policy you created in the [previous step](/docs/connections/destinations/catalog/amazon-personalize/#create-an-iam-policy).
690
690
3. Finish with any other set up items you may want (like `tags`).
691
-
4. Search for and click on your new roles from the [IAM home](https://console.aws.amazon.com/iam/home#/home).
691
+
4. Search for and click on your new roles from the [IAM home](https://console.aws.amazon.com/iam/home#/home){:target="_blank"}.
692
692
5. Select the **Trust Relationships** tab, then click **Edit trust relationship**.
693
693
694
694

@@ -698,7 +698,7 @@ To create an IAM role:
698
698
> note ""
699
699
> **NOTE:** Your Source ID can be found by navigating to **Settings > API Keys** from your Segment source homepage.
700
700
>
701
-
> If you're using an External ID, for security purposes, Segment recommends you to use your Workspace ID as your External ID. If you’re currently using an External ID different from your Workspace ID, you’ll be susceptible to attacks. You can find your Workspace ID by going to: **Settings > Workspace Settings > ID**.
701
+
> If you're using an External ID, for security purposes, Segment recommends you to use your Segment Workspace ID as your External ID. If you use an External ID different from your Workspace ID, you’re susceptible to attacks. You can find your Workspace ID by going to: **Settings > Workspace Settings > ID** in the Segment dashboard.
0 commit comments