utm_source = email for registration and login complete events #6258
Comments
This is not quite accurate. UTM params should be about the top of funnel. We want to know where people started. After all, UTM params are meant for tracking advertising channels which are top of funnel. Even if your statement was correct, it seems to be that it would be impossible that the previous step to a registration was clicking on a link from one of our confirmation emails: https://analytics.amplitude.com/org/31251/chart/oirl9vh/edit/t65fjat To go through that email, you would have had to be registered. Therefore, you should not be in the middle of registering. That aside, we should be more descriptive with utm_source=email. Email is a medium not a source. It leaves room for too much interpretation. A login_complete on iOS could have for example the following utm params: or utm_source=reg_confirmation(_email)
In this particular case, it also makes sense for the UTM params to be different then everything before the email because in theory, the user is starting a new funnel so it would not be inaccurate to call out from which email the user came. |
@davismtl what is the action item here? |
The scope of this problem seems to be a bit bigger in light of the conversation.
|
When @jpetto asked how utm_ and entrypoint are used in the context of the mozilla.org iframeless integration (not about:welcome), I responded with:
|
@mozilla/fxa-core can an engineer explain the circumstances that lead to https://analytics.amplitude.com/org/31251/chart/oirl9vh/edit/t65fjat It was my understanding that this was related to the confirmation email being clicked from another device, but according to Alex's comment above, this should not be possible. I'll start on an audit of our utm param and entrypoint values, so that we can get on the same page about how these should be set. |
All emails have UTM links generated in them: If I click "Verify" in any of those emails and get to the content server my utm params are 'email'. Therefore I will be counted as a registration from that new open tab. I hope that explains the metrics results |
I understand but that isn't right. Under that logic, all registrations would look like utm_source=email since they all have to verify in an email at registration and will all have a tab open. This overwrites the true origin of the registration. |
That is true I think! |
From what I'm reading, it sounds like any user that verifies on a 2nd device has their utm_source updated to email? If so, that seems like a bug. It seems like a better way of handling it would be to check if a utm_source is already associated with the registration, and if so do not update. |
There is a caveat, I don't know if what I stated is possible. |
Currently, the vast majority of our `fxa_reg - complete` events in Amplitude are incorrectly showing up with `utm_source` set to `email`. This is because the auth server forces it on all links in email addresses, so when the user clicks the verification link the original `utm_source` for that flow is overwritten. A separate PR for the auth server [1] has been opened to prevent this from happening. But in order for that PR not to break legitimate cases where we want `utm_source` set to `email`, we must first handle those legitimate cases elsewhere. Hence this PR. The connect-another-device view can only be reached from a verification email. When a user signs in from that view, we always want the new flow to have `utm_source` set to `email`. This change simply hard-codes the `utm_source` on signin links in that view. Related issues: * #6258 * mozilla/fxa-auth-server#2496 [1]: mozilla/fxa-auth-server#2505
Currently, the vast majority of our `fxa_reg - complete` events in Amplitude are incorrectly showing up with `utm_source` set to `email`. This is because the auth server forces it on all links in email addresses, so when the user clicks the verification link the original `utm_source` for that flow is overwritten. A separate PR for the auth server [1] has been opened to prevent this from happening. But in order for that PR not to break legitimate cases where we want `utm_source` set to `email`, we must first handle those legitimate cases elsewhere. Hence this PR. The connect-another-device view can only be reached from a verification email. When a user signs in from that view, we always want the new flow to have `utm_source` set to `email`. This change simply hard-codes the `utm_source` on signin links in that view. [1]: mozilla/fxa-auth-server#2505 Related issues: * #6258 * mozilla/fxa-auth-server#2496 #6342 r=shane-tomlinson
opening this to confirm that this is logged when (and only when) a user confirms their email (both login and registration), on a device other than the one they began the signup process on.
In amplitude, only
fxa_login - complete
andfxa_reg - complete
seem to have utm_source = email (fxa_reg - view
or other earlier steps in the funnel do not). This indicates to me thatutm_source
is set separately for every event in the funnel, and does not necessarily reflect whatever the original starting source was. Am I right about this?On the other hand,
entrypoint
seems to be consistent throughout the funnel reflecting the originating point of the flow.@davismtl If all of the above is basically right, then we should probably be grouping our charts by
entrypoint
rather thanutm_source
if we want to know where a completed flow started out.@mozilla/fxa-core can someone who knows the answer to this off the top of their head give us a pointer here? thanks!
The text was updated successfully, but these errors were encountered: