Configure cloud export accounts
Before you can export Customer Journey Analytics reports to a cloud destination as described in Export Customer Journey Analytics reports to the cloud, you need to add and configure the destination where you want the data to be sent.
This process consists of adding and configuring the account (such as Amazon S3, Google Cloud Platform, and so forth) as described in this article, and then adding and configuring the location within that account (such as a folder within the account) as described in Configure cloud export locations.
For information about how to manage existing accounts, including viewing, editing, and deleting accounts, see Manage cloud export locations and accounts.
Begin creating a cloud export account
-
Make sure you meet the minimum requirements for exporting reports to the cloud.
-
In Customer Journey Analytics, select Components > Exports.
-
On the Exports page, select the Location accounts tab.
-
Select Add account.
The Add account dialog displays.
-
In the Location account name field, specify a name for the location account. This name appears when creating a location.
-
In the Location account description field, provide a short description of the account to help differentiate it from other accounts of the same account type.
-
Enable the option to Make account available to all users in your organization if you want to allow other users in your organization to use the account.
Consider the following when sharing accounts:
-
Accounts that you share cannot be unshared.
-
Shared accounts can be edited only by the owner of the account.
-
Anyone can create a location for the shared account.
-
-
In the Account type field, select the type of cloud account you are exporting to. Available account types are Amazon S3 Role ARN, Google Cloud Platform, Azure SAS, Azure RBAC, Snowflake, and AEP Data Landing Zone.
-
Continue with the section below that corresponds to the Account type you selected.
AEP Data Landing Zone
-
Begin creating a cloud export account in either of the following ways:
-
From the Exports page as described above, in Begin creating a cloud export account
-
-
Select Save.
The Export account created dialog displays.
-
Copy the contents of the SAS URI field to your clipboard. You will use this SAS URI to access the data that is exported from Analysis Workspace from the AEP Data Landing Zone.
If this field is empty, you need to be granted permission to access ÃÛ¶¹ÊÓƵ Experience Platform.
-
In ÃÛ¶¹ÊÓƵ Experience Platform, configure your Data Landing Zone container to use the SAS URI that you copied.
note note NOTE Because the AEP Data Landing Zone account is based on Azure, the easiest way to access reports that you export to AEP Data Landing Zone is by using the Azure Storage Explorer. The following steps use this method. -
If you haven’t already, download the .
-
In the ÃÛ¶¹ÊÓƵ Experience Platform documentation, follow the steps described in Connect your Data Landing Zone container to Azure Storage Explorer.
You can skip the tasks described in the sections Retrieve the credentials for your Data Landing Zone and Update Data Landing Zone credentials, because the URI that you copied contains these credentials.
-
When following the ÃÛ¶¹ÊÓƵ Experience Platform documentation and you come to the Blob container SAS URL field, paste the SAS URI that you copied in Step 3.
note note NOTE You need to perform this action every 7 days, because the SAS URI expires 7 days after it is created. You can create a script to automate this process. -
Select Next > Connect.
-
-
In Customer Journey Analytics, in the Export account created dialog, select OK.
-
Continue with Configure cloud export locations.
Amazon S3 Role ARN
-
Begin creating a cloud export account in either of the following ways:
-
From the Exports page as described above, in Begin creating a cloud export account
-
-
In the Account properties section of the Add account dialog box, specify the following information:
table 0-row-2 1-row-2 layout-auto Field Function Role ARN You must provide a Role ARN (Amazon Resource Name) that ÃÛ¶¹ÊÓƵ can use to gain access to the Amazon S3 account. To do this, you create an IAM permission policy for the source account, attach the policy to a user, and then create a role for the destination account. For specific information, see . -
Select Save.
The Export account created dialog displays.
-
Copy the contents of the User ARN field to your clipboard. The User ARN (Amazon Resource Name) is provided by ÃÛ¶¹ÊÓƵ. You must attach this user to the policy you created in Amazon S3 Role ARN.
-
Select OK.
-
Continue with Configure cloud export locations.
Google Cloud Platform
-
Begin creating a cloud export account in either of the following ways:
-
From the Exports page as described above, in Begin creating a cloud export account
-
-
In the Account properties section of the Add account dialog box, specify the following information:
table 0-row-2 1-row-2 layout-auto Field Function Project ID Your Google Cloud project ID that you copy from your Google Cloud account. See the . -
Select Save.
The Export account created dialog displays.
-
Copy the contents of the Principal field to your clipboard, then ensure that you grant permission to the Principal to upload files to this bucket in Google Cloud Platform.
-
Select OK.
-
Continue with Configure cloud export locations.
Azure SAS
-
Begin creating a cloud export account in either of the following ways:
-
From the Exports page as described above, in Begin creating a cloud export account
-
-
In the Account properties section of the Add account dialog box, specify the following information:
table 0-row-2 1-row-2 2-row-2 3-row-2 4-row-2 5-row-2 layout-auto Field Function Application ID Copy this ID from the Azure application that you created. In Microsoft Azure, this information is located on the Overview tab within your application. For more information, see the . Tenant ID Copy this ID from the Azure application that you created. In Microsoft Azure, this information is located on the Overview tab within your application. For more information, see the . Key vault URI The path to the SAS URI in Azure Key Vault. To configure Azure SAS, you need to store an SAS URI as a secret using Azure Key Vault. For information, see the .
After the key vault URI is created:
-
Add an access policy on the Key Vault in order to grant permission to the Azure application that you created.
For information, see the .
Or
If you want to grant an access role directly without creating an access policy, see the . This adds the role assignment for the application ID to access the key vault URI.
-
Make sure the Application ID has been granted the
Key Vault Certificate User
built-in role in order to access the key vault URI.For more information, see .
Key vault secret name The secret name you created when adding the secret to Azure Key Vault. In Microsoft Azure, this information is located in the Key Vault you created, on the Key Vault settings pages. For information, see the . Location account secret Copy the secret from the Azure application that you created. In Microsoft Azure, this information is located on the Certificates & secrets tab within your application. For more information, see the . -
-
Select Save.
The Export account created dialog displays.
-
If you haven’t already, ensure that you grant permissions to the bucket in Azure SAS.
-
Select OK.
-
Continue with Configure cloud export locations.
Azure RBAC
-
Begin creating a cloud export account in either of the following ways:
-
From the Exports page as described above, in Begin creating a cloud export account
-
-
In the Account properties section of the Add account dialog box, specify the following information:
table 0-row-2 1-row-2 2-row-2 3-row-2 layout-auto Field Function Application ID Copy this ID from the Azure application that you created. In Microsoft Azure, this information is located on the Overview tab within your application. For more information, see the . Tenant ID Copy this ID from the Azure application that you created. In Microsoft Azure, this information is located on the Overview tab within your application. For more information, see the . Location account secret Copy the secret from the Azure application that you created. In Microsoft Azure, this information is located on the Certificates & secrets tab within your application. For more information, see the . -
Select Save.
The Export account created dialog displays.
-
If you haven’t already, ensure that you grant permissions to the bucket in Azure RBAC.
-
Select OK.
-
Continue with Configure cloud export locations.
Snowflake
-
Begin creating a cloud export account in either of the following ways:
-
From the Exports page as described above, in Begin creating a cloud export account
-
-
In the Account properties section of the Add account dialog box, specify the following information:
table 0-row-2 1-row-2 2-row-2 3-row-2 layout-auto Field Function Account identifier Uniquely identifies a Snowflake account within your organization, as well as throughout the global network of Snowflake-supported cloud platforms and cloud regions.
You need to get the account identifier from your Snowflake account, then paste the information here.
To learn where to get this information, see the .
User The login name of the user that will be used for the connection. We recommend creating a new user that will be used specifically for ÃÛ¶¹ÊÓƵ. Specify the name here, then create a user in Snowflake with the same name. You can create a user in Snowflake using the
CREATE USER
command.For more information, see the .
Role The role that will be assigned to the user. We recommend creating a new role that will be used specifically for ÃÛ¶¹ÊÓƵ. Specify the role here, then create a role in Snowflake with the same name and grant the role to the user. You can create a role in Snowflake using the
CREATE ROLE
command.For more information, see the .
-
Select Save.
The Export account created dialog displays.
-
Copy the contents of the Public key field to your clipboard. The Public key is provided by ÃÛ¶¹ÊÓƵ.
Use the public key in Snowflake to connect to your Snowflake account. You must associate the user that you created with this public key.
For example, in Snowflake, specify the following command:
code language-none CREATE USER <your_adobe_user> RSA_PUBLIC_KEY = '<your_public_key>';
For more information, see the .
-
Select OK.
-
Continue with Configure cloud export locations.