Setting general connection properties
This section describes how to configure general connection properties. For an explanation of how to configure advanced connection properties, see Setting advanced connection properties.
To add an Amazon RDS for PostgreSQL endpoint source database to Qlik Replicate:
- In the Qlik Replicate console, click Manage Endpoint Connections to open the Manage Endpoint Connections dialog box. For more information on adding an endpoint to Qlik Replicate, see Defining and managing endpoints.
- In the Name field, type a name for your Amazon RDS for PostgreSQL database. This can be any name that will help to identify the database being used.
- In the Description field, type a description that helps to identify the Amazon RDS for PostgreSQL database. This is optional.
- Select Source as the database role.
-
Select Amazon RDS for PostgreSQL as the database Type.
Information noteWhen this endpoint is used as a duplicated source in a Log Stream Staging setup, select the Read changes from log stream check box and then select the relevant Log Stream Staging task from the drop-down list.
For information on setting up and managing Log Stream Staging tasks, see Using the Log Stream.
-
In the Server name field, specify the host name of the database instance, for example:
myinstance.123456789012.us-east-1.rds.amazonaws.com
- Optionally, change the default Port (5432).
-
Enter the Amazon RDS for PostgreSQL database authentication information (Username, Password) of an authorized Amazon RDS for PostgreSQL user. If you do not know this information, see your Amazon RDS for PostgreSQL database system manager.
Information noteConsider the following:
-
This information is case sensitive.
-
To determine if you are connected to the database you want to use or if the connection information you entered is correct, click Test Connection.
If the connection is successful a message in green is displayed. If the connection fails, an error message is displayed at the bottom of the dialog box.
To view the log entry if the connection fails, click View Log. The server log is displayed with the information for the connection failure. Note that this button is not available unless the test connection fails.
Information noteMake sure that the Amazon RDS for PostgreSQL database user entered in the Amazon RDS for PostgreSQL database Authentication section has the correct access privileges.
-
-
Type the Database name or select one from the list of available endpoints. This is the name of the Amazon RDS for PostgreSQL database from which you are replicating data.
SSL authentication options
In the Security section, you can configure Replicate to connect to the Amazon RDS for PostgreSQL database using SSL.
- SSL Mode:
Select one of the following:
- Disable - Connect with a surname and password only.
- Allow - Establish an encrypted connection if requested by the server.
- Prefer - Establishes an encrypted connection if the server supports encrypted connections, falling back to an unencrypted connection if an encrypted connection cannot be established.
- Require - Establishes an encrypted connection if the server supports encrypted connections. The connection attempt fails if an encrypted connection cannot be established.
- Verify CA - Similar to Required, but also verifies the server Certificate Authority (CA) certificate against the configured CA certificates. The connection attempt fails if no valid matching CA certificates are found.
- Verify Full - Similar to Verify CA, but also performs host name identity verification by checking the host name the client (i.e. Replicate) uses for connecting to the server against the identity in the certificate that the server sends to the client. The client checks whether the host name that it uses for connecting matches the Common Name value in the server certificate. The connection fails if there is a mismatch.
- Client certificate path - The path to the client certificate requested by the server.
- Secret key path - The path to the client private key file in PEM format.
- CA path - The path to the Certificate Authority (CA) that issued the client certificate file in PEM format.
- CRL path - The path to the CRL certificate. This file contains certificates revoked by certificate authorities. If the server certificate appears in this list, the connection will fail.
- SSL compression -Select this option to compress the data before it is encrypted.