Push Data to Google Cloud Storage (GCS)

   Note: Data Warehouse Push is currently only available in beta for Postscript brands on the enterprise plan. To begin using Data Warehouse Push, please be sure to first contact your Customer Success Manager.

Data Warehouse Push allows Postscript to automatically send both historical and new data stored in-app, including clicks, order attribution, and more, to your designated data warehouse. 

In this article, we'll walk you through the three steps for configuring your Google Cloud Storage (GCS) destination.

Before Getting Started

By default, GCS authentication uses role-based access. You will need the data-syncing service's service account name available to grant access. It should look like datasync-smsmarkt@prql-prod.iam.gserviceaccount.com.

Step 1: Create a service account

  1. In the GCP console, navigate to the IAM & Admin menu, click into the Service Accounts tab, and click Create service account at the top of the menu.
  2. In the first step, name the service account that will be used to transfer data into Cloud Storage and click Create and Continue. Click Continue in the following optional step without assigning any roles.
  3. In the Grant users access to this service account step, within the Service account users role field, enter the provided Service account (see prerequisite) and click Done.
  4. Once successfully created, search for the created service account in the service accounts list, click the Service account name to view the details, and make a note of the email (note: this is a different email than the service's service account).
  5. Select the permissions tab, find the provided principal name (Service account from the prerequisite), click the Edit principal button (pencil icon), click Add another role, select the Service Account Token Creator role, and click Save.

Alternative authentication method: HMAC Access Key & Secret

Role based authentication is the preferred authentication mode for Google Cloud Storage based on GCP recommendations, however, HMAC Access Key ID & Secret Access Key is an alternative authentication method that can be used if preferred. An HMAC key is a type of credential and can be associated with a service account or a user account to access Google Cloud Storage.

1. Navigate to the Cloud Storage page.

2. Click into the Settings tab on the left side menu.

3. Navigate to the Interoperability tab and click the Create a key for a Service Account button.

4. Select the Service Account created in Step 1, and click Create key.

5. Make a note of the Access key and Secret.

Step 2: Create destination GCS bucket

1. Navigate to the Cloud Storage page.

2. Click Create.

3. Enter a bucket name, choose a region (Note: at the Choose how to control access to objects step, we recommend selecting Enforce public access prevention on this bucket.

4. After choosing your preferences for the remaining steps, click Create.

5. On the Bucket details page for the bucket you created, select the Permissions tab, and click Grant access.

6. Grant access to the principal (Service Account) you created in Step 1 (Note: this is the service account you created, not the service account from the prerequisite), and assign the Role: Storage Legacy Bucket Writer. Click Save.

Step 3: Add your destination

Securely share your bucket name, your chosen folder name for the data, and your Service account email with us to complete the connection.

Get Support

Have questions? Please feel free to reach out to our wonderful Support team at support@postscript.io or via live chat. You can also submit a support request here!

Need ongoing channel strategy guidance? Please fill out this form and we'll connect you to one of our certified partners.

Was this article helpful?
0 out of 0 found this helpful