Skip to content

Commit bc87418

Browse files
committed
adding new documentation on supported integrations, and mappings
1 parent 5df971a commit bc87418

File tree

1 file changed

+21
-5
lines changed
  • src/connections/destinations/catalog/actions-s3

1 file changed

+21
-5
lines changed

src/connections/destinations/catalog/actions-s3/index.md

Lines changed: 21 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,12 @@ The AWS S3 (Actions) destination enhances this capability by introducing configu
2525

2626
* **Enhanced Delivery Controls**. The destination provides advanced options for batch size controls and file naming conventions. These controls can help optimize efficiency and simplify data retrieval workflows.
2727

28+
## Supported Integrations
29+
The AWS S3 (Actions) Destination supports the following Segment features as supported native Destination integration points:
30+
* rETL
31+
* Classic and Linked Audiences
32+
* Connections
33+
2834
## Getting started
2935
Setting up the AWS S3 (Actions) destination is a straightforward process designed to help you configure and deploy standardized event data to your Amazon S3 bucket. Follow these steps to get started:
3036

@@ -36,7 +42,7 @@ Ensure you have the following in place before configuring the AWS S3 (Actions) d
3642
- IAM Access IDs: Prepare your AWS IAM ARN ID and IAM External ID. These will be needed to authenticate and authorize Segment with your S3 bucket.
3743

3844

39-
### Step 1: Create an IAM role in the AWS console
45+
## Step 1: Create an IAM role in the AWS console
4046
To set up the IAM role to properly authorize Segment with the AWS S3 (Actions) destination:
4147

4248
1. Log in to your AWS account.
@@ -69,7 +75,7 @@ To set up the IAM role to properly authorize Segment with the AWS S3 (Actions) d
6975
"Effect": "Allow",
7076
"Principal": {
7177
"AWS":
72-
"arn:aws:iam::595280932656:role/customer-s3-prod-action-destination-access"
78+
"arn:aws:iam::595280932656:role/customer-s3-prod-action-destination-access"
7379
},
7480
"Action": "sts:AssumeRole",
7581
"Condition": {
@@ -81,8 +87,9 @@ To set up the IAM role to properly authorize Segment with the AWS S3 (Actions) d
8187
]
8288
}
8389
```
90+
8491
## Step 2: Add the AWS S3 (Actions) Destination in Segment
85-
To finish the configuration, enable the AWS S3 (Actions) Destination in your workspace.
92+
To finish the setup, enable the AWS S3 (Actions) Destination in your workspace:
8693

8794
1. Add the **AWS S3 (Actions)** destination from the Destinations tab of the catalog.
8895
2. Select the data source you want to connect to the destination.
@@ -93,8 +100,17 @@ To finish the configuration, enable the AWS S3 (Actions) Destination in your wor
93100
* Enter the ARN of the IAM role you created above. The ARN should follow the format `arn:aws:iam::ACCOUNT_ID:role/ROLE_NAME.`
94101
* Enter the IAM External ID, which is a value set in the Trust Relationship under your AWS IAM Role.
95102
5. Enable the destination.
96-
6. Verify the Segment data is stored in the S3 bucket by navigating to the `<your_S3_bucket>/` in the AWS console.
97103

98104
{% include components/actions-fields.html settings="true"%}
99105

100-
106+
## Step 3: Configure the AWS S3 (Actions) Destination mappings
107+
To finish the configuration, finalize the mappings of the new AWS S3 (Actions) Destination:
108+
109+
1. Add a new **Sync to S3** Action into the destination.
110+
2. Define the Event Trigger
111+
3. Configure the Column Mappings that are needed, if any of the default columns are **not** needed, leave the value blank. You can also choose to add new mapping fields to set up any customized columns as needed.
112+
4. Configure the Other Settings as needed:
113+
* Enable Batching, Delimiter and File Extension are all required.
114+
* **Note** If the audience_action or batch_size column names are not needed, these fields can be left blank so they do not output on the S3 file.
115+
5. Enable the Mapping and start sending data!
116+
6. Verify the Segment data is stored in the S3 bucket by navigating to the `<your_S3_bucket>/` in the AWS console.

0 commit comments

Comments
 (0)