![]() IMPORTANT: Because of AWS limitations, you can only use logical replication if you connect Fivetran to your Amazon RDS PostgreSQL master instance. ![]() Logical replication with the test_decoding plugin SUNSET link To learn more, see our logical replication with the pgoutput plugin documentation. This plugin replicates from your custom publication without needing additional libraries. Fivetran reads the WAL using the pgoutput plugin to detect any new or changed data. Logical replication is based on logical decoding of the PostgreSQL write-ahead log (WAL). ![]() You can only enable logical replication with the pgoutput plugin if your PostgreSQL version is 10 or later. Logical replication with the pgoutput plugin link You will configure your incremental update mechanism in later steps. Learn more in our Updating data documentation.Ĭhoose logical replication with the pgoutput plugin, logical replication with the test_decoding plugin, XMIN, or Fivetran Teleport Sync as your incremental update mechanism. TIP: We recommend using logical replication as your incremental update mechanism because it is faster than XMIN replication and allows Fivetran to detect deleted rows for tables with primary keys. Fivetran Teleport Sync instead takes snapshots of tables to calculate differences. The first three methods keep a record of recent data changes, which allows Fivetran to update only the data that has changed since our last sync. logical replication with the test_decoding plugin SUNSET.logical replication with the pgoutput plugin.To keep your data up to date after the initial sync, we use one of the following incremental sync methods: Learn more in AWS’ PrivateLink documentation.įollow our AWS PrivateLink setup guide to configure PrivateLink for your database. PrivateLink is the most secure connection method. IMPORTANT: You must have a Business Critical plan to use AWS PrivateLink.ĪWS PrivateLink allows VPCs and AWS-hosted or on-premises services to communicate with one another without exposing traffic to the public internet. ![]() If you connect using SSH, you will configure your SSH tunnel server's security group to allow Fivetran access and configure your database's security to allow access from the tunnel.īefore you proceed to the next step, you must follow our SSH connection instructions. You must connect through SSH if your database is in an inaccessible subnet. Connect using SSH linkįivetran connects to a separate server in your network that provides an SSH tunnel to your database. If you connect directly, you will create a rule in a security group that allows Fivetran access to your database instance. Connect directly linkįivetran connects directly to your database instance. How you configure your security groups in later steps will differ depending on this decision. IMPORTANT: You must have TLS enabled on your database to connect to Fivetran.ĭecide whether to connect your database to Fivetran directly or using an SSH tunnel. Setup instructions link Choose connection method (TLS required) link (If you want to connect using SSH) An SSH server.Follow Amazon's TLS setup instructions to enable TLS on your database. Your database host's IP (e.g., 1.2.3.4) or domain ( ).An RDS account with an account administrator role.To connect your Amazon RDS PostgreSQL database to Fivetran, you need: Edit on GitHub Amazon RDS PostgreSQL Setup Guide linkįollow these instructions to replicate your Amazon RDS PostgreSQL database to your destination using Fivetran.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |