Setting general connection properties
This section describes how to configure general connection properties. For an explanation of how to configure advanced connection properties, see Setting advanced connection properties.
To add a Google Cloud AlloyDB for PostgreSQL target endpoint to Qlik Replicate:
- In Tasks view, click Manage Endpoint Connections to open the Manage Endpoints Connections dialog box. Then click the New Endpoint Connection button. For more information on adding an endpoint to Qlik Replicate, see Defining and managing endpoints.
- In the Name field, type a name for your database. This can be any name that will help to identify the database being used.
- In the Description field, type a description that helps to identify the PostgreSQL database. This is optional.
-
Select Target as the database role.
-
From the Type drop-down list, select Google Cloud AlloyDB for PostgreSQL.
- Type the Host name. This is the name or IP address or host name of the computer with the PostgreSQL database that you want to access.
- Optionally, change the default port (5432).
-
Enter the PostgreSQL database authentication information (Username, Password) of an authorized PostgreSQL user. If you do not know this information, see your PostgreSQL database system manager.
Information noteConsider the following:
-
This information is case sensitive.
-
To determine if you are connected to the database you want to use or if the connection information you entered is correct, click Test Connection.
If the connection is successful a message in green is displayed. If the connection fails, an error message is displayed at the bottom of the dialog box.
To view the log entry if the connection fails, click View Log. The server log is displayed with the information for the connection failure. Note that this button is not available unless the test connection fails.
Information noteMake sure that the specified PostgreSQL database user has the correct access privileges.
-
-
Type the Database name.
SSL authentication options
In the Security section, you can configure Replicate to connect to the PostgreSQL database using SSL.
The specified certificates are relevant only for bulk insert operations.
- SSL Mode:
Select one of the following:
- Disable - Connect with a surname and password only.
- Allow - Establish an encrypted connection if requested by the server.
- Prefer - Establishes an encrypted connection if the server supports encrypted connections, falling back to an unencrypted connection if an encrypted connection cannot be established.
- Require - Establishes an encrypted connection if the server supports encrypted connections. The connection attempt fails if an encrypted connection cannot be established.
- Verify CA - Similar to Required, but also verifies the server Certificate Authority (CA) certificate against the configured CA certificates. The connection attempt fails if no valid matching CA certificates are found.
- Verify Full - Similar to Verify CA, but also performs host name identity verification by checking the host name the client (i.e. Replicate) uses for connecting to the server against the identity in the certificate that the server sends to the client. The client checks whether the host name that it uses for connecting matches the Common Name value in the server certificate. The connection fails if there is a mismatch.
- Client certificate path - The path to the client certificate requested by the server.
- Secret key path - The path to the client private key file in PEM format.
- CA path - The path to the Certificate Authority (CA) that issued the client certificate file in PEM format.
- CRL path - The path to the CRL certificate. This file contains certificates revoked by certificate authorities. If the server certificate appears in this list, the connection will fail.
- SSL compression -Select this option to compress the data before it is encrypted.