Amplitude Data's Kinesis Data Firehose integration lets you stream your Amplitude event data straight to a Kinesis Firehose stream.
user_id
, event_name
, and created_at
along with all user, group, and event properties to Firehouse streams.arn:aws:iam::{your aws account id}:role/{role name}
Create a Kinesis Data Firehose stream in the AWS console.
Create an IAM role that gives Amplitude permission to write directly to your AWS Kinesis Data Firehose Stream.
For Account ID, specify: 358203115967. This is Amplitude's AWS account used to export events.
Finalize the role without assigning any policies.
The Trust Relationships for the new should look like this:
1{ 2 "Version": "2012-10-17", 3 "Statement": [ 4 { 5 "Effect": "Allow", 6 "Principal": { 7 "AWS": "arn:aws:iam::358203115967:root" 8 }, 9 "Action": "sts:AssumeRole"10 }11 ]12}
Create an IAM Policy to give Amplitude permission to write to your Kinesis Stream.
Select the Create Policy from JSON option and use the following template policy in the Policy Document field. Be sure to change the {account-id} to your account-id, and replace {region} and {stream-name} with the applicable values. Also replace {role-name} with the role just created.
1{ 2 "Version": "2012-10-17", 3 "Statement": [ 4 { 5 "Effect": "Allow", 6 "Action": [ 7 "firehose:PutRecord", 8 "firehose:PutRecordBatch", 9 "iam:SimulatePrincipalPolicy"10 ],11 "Resource": [12 "arn:aws:firehose:{region}:{account-id}:deliverystream/{stream-name}",13 "arn:aws:iam::{account-id}:role/{role-name}"14 ]15 }16 ]17}
Assign the new policy to the role.
Make note of the role ARN, stream region, and stream name. You need these to set up the destination in Amplitude.
Create a Kinesis Firehose destination in Amplitude.
Thanks for your feedback!
April 18th, 2024
Need help? Contact Support
Visit Amplitude.com
Have a look at the Amplitude Blog
Learn more at Amplitude Academy
© 2024 Amplitude, Inc. All rights reserved. Amplitude is a registered trademark of Amplitude, Inc.