You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/connections/destinations/catalog/activecampaign/index.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -78,7 +78,7 @@ ActiveCampaign also supports updating a contact's custom fields with this integr
78
78
79
79
For example, if you have a contact in ActiveCampaign with these custom fields:
80
80
81
-

81
+

82
82
83
83
You can update those fields using this identify call:
Copy file name to clipboardExpand all lines: src/connections/destinations/catalog/adobe-analytics/identity.md
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -9,14 +9,14 @@ The Identity Resolution destination settings are:
9
9
-**Marketing Cloud ID**
10
10
-**Drop VisitorID**, and **No Fallbacks for VisitorID:Server-Side Only** destination settings.
11
11
12
-

12
+

13
13
14
14
The Timestamp destination settings are:
15
15
-**Timestamp Option**
16
16
-**Send Both Timestamp and VisitorID for Timestamp Optional Reporting Suites**
17
17
-**Prefer VisitorID for Hybrid Timestamp Reporting**
18
18
19
-

19
+

20
20
21
21
## Analytics.js - Device Mode
22
22
@@ -65,4 +65,4 @@ If **No Fallbacks for Visitor ID** is enabled, and you're setting a `marketingCl
65
65
66
66
This decision tree is a visual representation of how Segment's Adobe Analytics destination settings and payload data interact with Segment to determine when to send a `visitorId` to Adobe.
67
67
68
-

68
+

Copy file name to clipboardExpand all lines: src/connections/destinations/catalog/adobe-analytics/settings.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -355,7 +355,7 @@ The Segment Adobe Analytics Merchandising setting runs as follows:
355
355
356
356
Let's take the following example:
357
357
358
-

358
+

359
359
360
360
The configuration in the example image above configures an `Order Completed` Segment event which sends Adobe Analytics:
361
361
-`event1` in `s.events` with the value passed from `properties.increment`.
Copy file name to clipboardExpand all lines: src/connections/destinations/catalog/adroll/index.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ id: 54521fd525e721e32a72ee8e
13
13
2. Search for "Adroll" in the Catalog, select it, and choose which of your sources to connect the destination to.
14
14
3. Locate both your AdRoll Advertiser ID and Pixel ID in AdRoll's "Audience" tab, "AdRoll Pixel" section. Click on "View Pixel". Your Advertiser ID will be listed beside `adroll_adv_id` and your AdRoll Pixel will be listed beside `adroll_pix_id`.
15
15
16
-

16
+

17
17
18
18
4. Add both your Advertiser ID and Pixel ID to your Segment Destination Settings.
Copy file name to clipboardExpand all lines: src/connections/destinations/catalog/amazon-lambda/index.md
+9-9Lines changed: 9 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -31,15 +31,15 @@ To build a Lambda function:
31
31
1. Go to the Lambda service page in your AWS account.
32
32
2. Click **Create a function** to create a new function.
33
33
34
-

34
+

35
35
36
36
3. Select **Author from scratch** since Segment will be providing the source code for the function.
37
37
4. Enter a name for your function and select your preferred runtime.
38
38
5. For the **Role** field, select **Create a new role from AWS policy templates** from the dropdown.
39
39
6. Create a **Role name** and leave **Policy templates** empty. This will create a role that can write to Cloud Watch logs. Cloud Watch logs are optional, though Segment supports them in the Segment settings.
40
40
7. Click **Create function**.
41
41
42
-

42
+

43
43
44
44
8. Copy the **ARN** for the Lambda and paste it into the **Lambda** setting in your Segment Lambda destination settings.
45
45
@@ -63,17 +63,17 @@ Using CloudFormation minimizes the setup steps needed, and is Segment's recommen
63
63
2. Create the CloudFormation stack.
64
64
1. Within the AWS Console, navigate to **CloudFormation > Stacks**.
65
65
66
-

66
+

67
67
68
68
2. Click **Create Stack**.
69
69
70
-

70
+

71
71
72
72
3. On the **Select Template** page, select **Upload a template to Amazon S3**. Using **Choose File**, select the SegmentLambdaDestinationCFTemplate you downloaded in the previous step.
73
73
74
74
4. Click **Next**.
75
75
76
-

76
+

77
77
78
78
5. Give your stack a name.
79
79
6. For the **ExternalId** parameter, enter the "External ID" setting in your Segment Lambda destination settings.
@@ -86,19 +86,19 @@ Using CloudFormation minimizes the setup steps needed, and is Segment's recommen
86
86
9. On the last page, review your template details and click **Create**.
87
87
10. You will now see your new Stack listed in the Stacks page.
88
88
89
-

89
+

90
90
91
91
11. Once the status is **CREATE_COMPLETE**, click on the name of your Stack.
92
92
12. On the Stack Detail page under the **Resources** section, you will see a policy and role listed.
93
93
94
-

94
+

95
95
96
96
13. Click the **Physical ID** of the role. You will be redirected to the summary page for the role within the IAM console.
97
97
14. Copy the **Role ARN** and copy it into the **Role Address** setting in your Segment Lambda destination settings.
98
98
99
99
Using the examples provided, your Segment Lambda destination settings will look something like this:
100
100
101
-

101
+

102
102
103
103
104
104
#### Create Policy and Role Manually
@@ -143,7 +143,7 @@ To create an IAM role:
143
143
5. Search for and select your new roles from the [IAM home](https://console.aws.amazon.com/iam/home#/home){:target="_blank"}.
144
144
6. Select the **Trust Relationships** tab, then click **Edit trust relationship**.
145
145
146
-

146
+

147
147
148
148
7. Copy and paste the following code into your trust relationship. You should replace `<your-source-id>` with either the Source ID of the attached Segment source (the default) or the External ID set in your AWS Lambda destination settings.
149
149
*`arn:aws:iam::595280932656:root` refers to Segment's AWS Account, and is what allows Segment's Destination to access the role to invoke your Lambda.
0 commit comments