Skip to content

Commit 2827226

Browse files
authored
Merge pull request #1872 from segmentio/marin/aws-updates-3
[StratConn-880] Update usage instructions for secretId
2 parents f50a2db + c914bc0 commit 2827226

File tree

2 files changed

+4
-4
lines changed
  • src/connections/destinations/catalog

2 files changed

+4
-4
lines changed

src/connections/destinations/catalog/amazon-kinesis-firehose/index.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -186,9 +186,9 @@ If you have many sources using Kinesis that it's impractical to attach all of th
186186

187187
To set this value for a Secret ID:
188188
1. Go to the Kinesis Firehose destination settings from each of your Segment sources.
189-
2. Click **Secret ID** and enter your Workspace ID.
189+
2. Click **Secret ID**.
190190
* **NOTE:** For security purposes, Segment sets your Segment Workspace ID as your Secret ID. If you’re using a Secret ID different from your Workspace ID, reach out to our support team so they can change it to make your account more secure.
191-
3. Once all of your sources are updated to use this value, find the IAM role you created for this destination in the AWS Console in **Services > IAM > Roles**.
191+
3. Find the IAM role you created for this destination in the AWS Console in **Services > IAM > Roles**.
192192
4. Select the role and navigate to the **Trust Relationships** tab.
193193
5. Click **Edit trust relationship**. You should see a snippet that looks something like this:
194194

src/connections/destinations/catalog/amazon-kinesis/index.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -216,9 +216,9 @@ After you update the IAM policy, Segment systems default to use PutRecords for m
216216
### Use secret ID
217217
If you have many sources using Kinesis that it's impractical to attach all of their IDs to your IAM role, you can instead opt to set a secret ID. To set this value:
218218
1. Go to **Connections > Destinations > Amazon Kinesis** for each of your Segment sources.
219-
2. Click **Secret ID** and enter your Workspace ID.
219+
2. Click **Secret ID**.
220220
* **NOTE:** For security purposes, Segment sets your Workspace ID as your Secret ID. If you’re using a Secret ID different from your Workspace ID, reach out to our support team so they can change it and make your account more secure.
221-
3. Once all of your sources have been updated to use this value, find the IAM role you created for this destination in the AWS Console in **Services > IAM > Roles**.
221+
3. Find the IAM role you created for this destination in the AWS Console in **Services > IAM > Roles**.
222222
4. Click on the role and navigate to the **Trust Relationships** tab.
223223
5. Click **Edit trust relationship**. You should see a snippet that looks something that looks like this:
224224

0 commit comments

Comments
 (0)