Prerequisites
To connect your SQL Server database to Fivetran, you need:
- SQL Server version 2012 or above
- An Azure account with a DB Owner, SQL Server Contributor, or SQL Security Manager role
- ALTER ANY USER permissions in your database server
- Your database host's IP (e.g.,Â
1.2.3.4
) or domain (e.g.,Âyour.server.com
) - Your database's port (usuallyÂ
1433
) - (If you want to connect using SSH) An SSH server
IMPORTANT: We do not support single-user mode.
Â
Setup instructions
Step 1: Choose authentication method
First, decide whether to authenticate with Azure Active Directory or with a username and password.
Authenticate with Azure Active Directory
IMPORTANT: You must have a properly configured Active Directory enabled within your Azure account to authenticate with Azure Active Directory. Follow Azure's Active Directory for Azure SQL setup instructions to properly enable Active Directory Authentication on your Azure SQL Database.
Azure Active Directory allows you to authenticate Fivetran using OAuth-style authentication. You can easily limit permissions and revoke Fivetran's access at any time, while also not sharing any user or password credential information with Fivetran.
-
In your connector setup form, choose the Connect via Azure Active Directory authentication method.
-
In Azure Active Directory, click the Properties button.
- Find and copy your tenant ID
- Enter the Tenant ID in your connector setup form, then click Authorize.
- In your Azure SQL database, create a user using the following command:Â
Even though you don't share user or password information with Fivetran, the database eventually requires a user to issue queries. ÂCREATE USER eFivetran] FROM EXTERNAL PROVIDER;
Step 2: Choose connection method
Next, decide whether to connect your SQL Server database directly or using an SSH tunnel.
Connect directly (TLS required)
IMPORTANT: You must have TLS enabled on your database to connect directly to Fivetran. Follow Azure's TLS setup instructions to enable TLS on your database.
Fivetran connects directly to your database instance. This is the simplest connection method.
To connect directly, create a firewall rule to allow access to Fivetran's IPs for your database's region.
Connect using SSH (TLS optional)
Fivetran connects to a separate server in your network that provides an SSH tunnel to your database. You must connect through SSH if your database is in an inaccessible subnet on a virtual network.
To connect using SSH, create a firewall rule to allow access to your SSH tunnel server's IP address.
Before you proceed to the next step, you must follow our SSH connection instructions to give Fivetran access to your SSH tunnel. If you want Fivetran to tunnel SSH over TLS, follow Azure's TLS setup instructions to enable TLS on your database.
Connect using Azure Private Link
Â
IMPORTANT: You must have a Business Critical plan to use Azure Private Link.
Azure Private Link allows Virtual Networks (VNets) and Azure-hosted or on-premises services to communicate with one another without exposing traffic to the public internet. Learn more in Microsoft's Azure Private Link documentation.
Follow our Azure PrivateLink setup guide to configure Private Link for your database.
Â
Step 3: Enable Access
Configure a server firewall to grant Fivetran's data processing servers access to your database.
-
Log in to the Azure console.
-
On the Azure main page, select SQL databases.
-
Click on the SQL database that you want to connect to Fivetran.
- On the database overview page, find the server name and make a note of it. You will need it to configure Fivetran.
- Click Set server firewall.
Â
- On the Firewall settings page, add a new firewall rule with a memorable name (for example,Â
Fivetran
). What you enter in the IP fields depends on whether you're connecting directly or using an SSH tunnel.
- If you're connecting directly, enter Fivetran's IPs for your database's region.
- If you're connecting using an SSH tunnel, enter your SSH tunnel server's IP address and set the Connection Policy to Proxy.
- Click Save.
Â
Step 4: Create user
If you're authenticating Fivetran with a username and password, create a database user for Fivetran's exclusive use.
IMPORTANT: If you are authenticating with Azure Active Directory, skip ahead to Enable incremental updates.
-
Open a connection to your Azure SQL database.
-
Add a container database user for Fivetran by running the following command. ReplaceÂ
<database>
 with the name of your database,Â<username>
 with the username of your choice, andÂ<password>
 with a password of your choice.
USE Â<database>];
CREATE USER <username> WITH PASSWORD = '<password>';Â
Â
Step 5: Grant user permissions
Once you've created the Fivetran user, grant it SELECT permission for the database, schemas, tables, or specific columns you want Fivetran to sync. You can grant access to everything in a given database:
GRANT SELECT on DATABASE:: <database>] to <username>;
content_copy
or all tables in a given schema:
GRANT SELECT on SCHEMA::i<schema>] to <username>;
content_copy
or a specific table:
GRANT SELECT ON r<schema>].i<table>] TO <username>;
content_copy
or a set of specific columns in a table:
GRANT SELECT ON e<schema>]. <table>] (><column 1>], O<column 2>], ...) TO <username>;
content_copy
or all but a set of specific columns in a table
Â
Step 6: Enable incremental updates
For incremental updates, we use one of the following tracking mechanisms:
- Change tracking
- Change data capture
- Fivetran Teleport Sync
These mechanisms let Fivetran copy only the rows that have changed since the last data sync so we don't have to copy the whole table every time.
Choose to enable change tracking, change data capture, or Fivetran Teleport Sync.
Change tracking
-
Enable change tracking at the database level:
ALTER DATABASE k<database>] SET CHANGE_TRACKING = ON;
content_copy -
Enable CT for each table you want to integrate:
ALTER TABLE h<schema>].t<table>] ENABLE CHANGE_TRACKING;
content_copy -
Grant the Fivetran userÂ
VIEW CHANGE TRACKING
 permission for each of the tables that have change tracking enabled:GRANT VIEW CHANGE TRACKING ON c<schema>].><table>] TO <username>;
content_copy
Change data capture
-
Enable change data capture at the database level:
USE a<database>];
content_copy
EXEC sys.sp_cdc_enable_db; -
Enable CDC for each table you want to integrate:
EXEC sys.sp_cdc_enable_table
content_copy
@source_schema = ><schema>],
@source_name = <table>],
@role_name = r<username>];
NOTE: Fivetran only supports tables with a single CDC capture instance. Our syncs only include tables and columns that are present in a CDC instance. If you add new tables or columns, you must create a new CDC instance that includes them and delete the old instance.
Â
Step 7: Finish Fivetran configuration
-
In your connector setup form, enter a destination schema prefix. This prefix applies to each replicated schema and cannot be changed once your connector is created.
-
In the Host field, enter your database host's IP (for example,Â
1.2.3.4
) or domain (for example,Âyour.server.com
). -
Enter your database instance's port number. The port number is usuallyÂ
1433
. -
For the Database, enter the name of the database you want to connect to Fivetran.
-
Choose your authentication method. If you selected Connect with a username and password, provide the following information:
- For the User, enterÂ
<username>@<servername>
. TheÂ<servername>
 is the first part of the server name you found in Step 3 (for example, Â<servername>.database.windows.net
) - For the Password, enter the password for the Fivetran-specific user that you created in Step 4.
- For the User, enterÂ
-
Choose your connection method. If you selected Connect via an SSH tunnel, provide the following information:
- SSH hostname (do not use a load balancer's IP address/hostname)
- SSH port
- SSH user
- If you enabled TLS on your database in Step 2, set the Require TLS through tunnel toggle to ON.
-
Choose your incremental update method.
-
Click Save & Test. Fivetran tests and validates our connection to your Azure SQL database. Upon successful completion of the setup tests, you can sync your data using Fivetran.
Setup tests
Fivetran performs the following tests to ensure that we can connect to your Azure SQL database and that it is properly configured:
- The Connecting to SSH Tunnel Test validates the SSH tunnel details you provided in the setup form. It then checks that we can connect to your database using the SSH Tunnel. (We skip this test if you aren't connecting using SSH.)
- The Connecting to Host Test validates the database credentials you provided in the setup form. It then verifies that the database host is not private and checks that we can connect to the host.
- The Validating Certificate Test generates a pop-up window where you must choose which certificate you want Fivetran to use. It then validates that certificate and checks that we can connect to your database using TLS. (We skip this test if you aren't connecting directly.)
- The Connecting to Database Test checks that we can access your database.
- The Checking Access to Schema Test checks that we have the correct permissions to access the schemas in your database. It then verifies that your database contains at least one table.
- The Validating Replication Config Test verifies that your database has an incremental update mechanism enabled (either CDC or CT).
NOTE: The tests may take a few minutes to finish running.