Skip to main content

Prerequisites

To connect your SQL Server database to Fivetran, you need:

  • SQL Server version 2012 or above
  • An Azure account with a DB Owner, SQL Server Contributor, or SQL Security Manager role
  • ALTER ANY USER permissions in your database server
  • Your database host's IP (e.g., 1.2.3.4) or domain (e.g., your.server.com)
  • Your database's port (usually 1433)
  • (If you want to connect using SSH) An SSH server

IMPORTANT: We do not support single-user mode.

 

Setup instructions

Step 1: Choose authentication method

First, decide whether to authenticate with Azure Active Directory or with a username and password.

Authenticate with Azure Active Directory

IMPORTANT: You must have a properly configured Active Directory enabled within your Azure account to authenticate with Azure Active Directory. Follow Azure's Active Directory for Azure SQL setup instructions to properly enable Active Directory Authentication on your Azure SQL Database.

Azure Active Directory allows you to authenticate Fivetran using OAuth-style authentication. You can easily limit permissions and revoke Fivetran's access at any time, while also not sharing any user or password credential information with Fivetran.

  1. In your connector setup form, choose the Connect via Azure Active Directory authentication method.

  2. In Azure Active Directory, click the Properties button.

  1. Find and copy your tenant ID
  2. Enter the Tenant ID in your connector setup form, then click Authorize.
  3. In your Azure SQL database, create a user using the following command: 
    CREATE USER eFivetran] FROM EXTERNAL PROVIDER;
    Even though you don't share user or password information with Fivetran, the database eventually requires a user to issue queries.  

Step 2: Choose connection method

Next, decide whether to connect your SQL Server database directly or using an SSH tunnel.

Connect directly (TLS required)

IMPORTANT: You must have TLS enabled on your database to connect directly to Fivetran. Follow Azure's TLS setup instructions to enable TLS on your database.

Fivetran connects directly to your database instance. This is the simplest connection method.

To connect directly, create a firewall rule to allow access to Fivetran's IPs for your database's region.

Connect using SSH (TLS optional)

Fivetran connects to a separate server in your network that provides an SSH tunnel to your database. You must connect through SSH if your database is in an inaccessible subnet on a virtual network.

To connect using SSH, create a firewall rule to allow access to your SSH tunnel server's IP address.

Before you proceed to the next step, you must follow our SSH connection instructions to give Fivetran access to your SSH tunnel. If you want Fivetran to tunnel SSH over TLS, follow Azure's TLS setup instructions to enable TLS on your database.

Connect using Azure Private Link

 

IMPORTANT: You must have a Business Critical plan to use Azure Private Link.

Azure Private Link allows Virtual Networks (VNets) and Azure-hosted or on-premises services to communicate with one another without exposing traffic to the public internet. Learn more in Microsoft's Azure Private Link documentation.

Follow our Azure PrivateLink setup guide to configure Private Link for your database.

 

Step 3: Enable Access

Configure a server firewall to grant Fivetran's data processing servers access to your database.

  1. Log in to the Azure console.

  2. On the Azure main page, select SQL databases.

  3. Click on the SQL database that you want to connect to Fivetran.

  1. On the database overview page, find the server name and make a note of it.  You will need it to configure Fivetran.
  1. Click Set server firewall.

 

  1. On the Firewall settings page, add a new firewall rule with a memorable name (for example, Fivetran). What you enter in the IP fields depends on whether you're connecting directly or using an SSH tunnel.
  • If you're connecting directly, enter Fivetran's IPs for your database's region.
  • If you're connecting using an SSH tunnel, enter your SSH tunnel server's IP address and set the Connection Policy to Proxy.
  1. Click Save.

 

Step 4: Create user

If you're authenticating Fivetran with a username and password, create a database user for Fivetran's exclusive use.

IMPORTANT: If you are authenticating with Azure Active Directory, skip ahead to Enable incremental updates.

  1. Open a connection to your Azure SQL database.

  2. Add a container database user for Fivetran by running the following command. Replace <database> with the name of your database, <username> with the username of your choice, and <password> with a password of your choice.

USE Â<database>];
CREATE USER <username> WITH PASSWORD = '<password>'; 
 

Step 5: Grant user permissions

Once you've created the Fivetran user, grant it SELECT permission for the database, schemas, tables, or specific columns you want Fivetran to sync. You can grant access to everything in a given database:

GRANT SELECT on DATABASE:: <database>] to <username>;
content_copy

or all tables in a given schema:

GRANT SELECT on SCHEMA::i<schema>] to <username>;
content_copy

or a specific table:

GRANT SELECT ON r<schema>].i<table>] TO <username>;
content_copy

or a set of specific columns in a table:

GRANT SELECT ON e<schema>]. <table>] (><column 1>], O<column 2>], ...) TO <username>;
content_copy

or all but a set of specific columns in a table

 

Step 6: Enable incremental updates

For incremental updates, we use one of the following tracking mechanisms:

  • Change tracking
  • Change data capture
  • Fivetran Teleport Sync

These mechanisms let Fivetran copy only the rows that have changed since the last data sync so we don't have to copy the whole table every time.

Choose to enable change tracking, change data capture, or Fivetran Teleport Sync.

Change tracking

  1. Enable change tracking at the database level:

    ALTER DATABASE k<database>] SET CHANGE_TRACKING = ON;
    content_copy
  2. Enable CT for each table you want to integrate:

    ALTER TABLE h<schema>].t<table>] ENABLE CHANGE_TRACKING;
    content_copy
  3. Grant the Fivetran user VIEW CHANGE TRACKING permission for each of the tables that have change tracking enabled:

    GRANT VIEW CHANGE TRACKING ON c<schema>].><table>] TO <username>;
    content_copy

Change data capture

  1. Enable change data capture at the database level:

    USE a<database>];
    EXEC sys.sp_cdc_enable_db;
    content_copy
  2. Enable CDC for each table you want to integrate:

    EXEC sys.sp_cdc_enable_table  
    @source_schema = ><schema>],
    @source_name = <table>],
    @role_name = r<username>];
    content_copy

NOTE: Fivetran only supports tables with a single CDC capture instance. Our syncs only include tables and columns that are present in a CDC instance. If you add new tables or columns, you must create a new CDC instance that includes them and delete the old instance.

 

Step 7: Finish Fivetran configuration

  1. In your connector setup form, enter a destination schema prefix. This prefix applies to each replicated schema and cannot be changed once your connector is created.

  2. In the Host field, enter your database host's IP (for example, 1.2.3.4) or domain (for example, your.server.com).

  3. Enter your database instance's port number. The port number is usually 1433.

  4. For the Database, enter the name of the database you want to connect to Fivetran.

  5. Choose your authentication method. If you selected Connect with a username and password, provide the following information:

    • For the User, enter <username>@<servername>. The <servername> is the first part of the server name you found in Step 3 (for example,  <servername>.database.windows.net)
    • For the Password, enter the password for the Fivetran-specific user that you created in Step 4.
  6. Choose your connection method. If you selected Connect via an SSH tunnel, provide the following information:

    • SSH hostname (do not use a load balancer's IP address/hostname)
    • SSH port
    • SSH user
    • If you enabled TLS on your database in Step 2, set the Require TLS through tunnel toggle to ON.
  7. Choose your incremental update method.

  8. Click Save & Test. Fivetran tests and validates our connection to your Azure SQL database. Upon successful completion of the setup tests, you can sync your data using Fivetran.

Setup tests

Fivetran performs the following tests to ensure that we can connect to your Azure SQL database and that it is properly configured:

  • The Connecting to SSH Tunnel Test validates the SSH tunnel details you provided in the setup form. It then checks that we can connect to your database using the SSH Tunnel. (We skip this test if you aren't connecting using SSH.)
  • The Connecting to Host Test validates the database credentials you provided in the setup form. It then verifies that the database host is not private and checks that we can connect to the host.
  • The Validating Certificate Test generates a pop-up window where you must choose which certificate you want Fivetran to use. It then validates that certificate and checks that we can connect to your database using TLS. (We skip this test if you aren't connecting directly.)
  • The Connecting to Database Test checks that we can access your database.
  • The Checking Access to Schema Test checks that we have the correct permissions to access the schemas in your database. It then verifies that your database contains at least one table.
  • The Validating Replication Config Test verifies that your database has an incremental update mechanism enabled (either CDC or CT).

NOTE: The tests may take a few minutes to finish running.

Be the first to reply!

Reply