Skip to main content Skip to complementary content

Setting general connection properties

This section describes how to configure general connection properties. For an explanation of how to configure advanced connection properties, see Setting advanced connection properties.

To add a Google Cloud SQL for PostgreSQL target endpoint to Qlik Replicate:

  1. In Tasks view, click Manage Endpoint Connections to open the Manage Endpoints Connections dialog box. Then click the New Endpoint Connection button. For more information on adding an endpoint to Qlik Replicate, see Defining and managing endpoints.
  2. In the Name field, type a name for your database. This can be any name that will help to identify the database being used.
  3. In the Description field, type a description that helps to identify the Google Cloud SQL for PostgreSQL database. This is optional.
  4. Select Target as the database role.

  5. From the Type drop-down list, select Google Cloud SQL for PostgreSQL

  6. Type the Server name. This is the name or IP address or host name of the computer with the Google Cloud SQL for PostgreSQL database that you want to access.
  7. Optionally, change the default port (5432).
  8. Enter the Google Cloud SQL for PostgreSQL database authentication information (User name, Password) of an authorized Google Cloud SQL for PostgreSQL user. If you do not know this information, see your Google Cloud SQL for PostgreSQL database system manager.

    Information note

    Consider the following:

    • This information is case sensitive.

    • To determine if you are connected to the database you want to use or if the connection information you entered is correct, click Test Connection.

      If the connection is successful a message in green is displayed. If the connection fails, an error message is displayed at the bottom of the dialog box.

      To view the log entry if the connection fails, click View Log. The server log is displayed with the information for the connection failure. Note that this button is not available unless the test connection fails.

    Information note

    Make sure that the specified Google Cloud SQL for PostgreSQL database user has the correct access privileges.

  9. Type the Database name or select one from the list of available endpoints. This is the name of the Google Cloud SQL for PostgreSQL database to which you are replicating data.

SSL authentication options

In the Security section, you can configure Replicate to connect to the Google Cloud SQL for PostgreSQL database using SSL.

Information note

The specified certificates are relevant only for bulk insert operations.

  • SSL Mode: Select one of the following:
    • Disable - Connect with a surname and password only.
    • Allow - Establish an encrypted connection if requested by the server.
    • Prefer - Establishes an encrypted connection if the server supports encrypted connections, falling back to an unencrypted connection if an encrypted connection cannot be established.
    • Require - Establishes an encrypted connection if the server supports encrypted connections. The connection attempt fails if an encrypted connection cannot be established.
    • Verify CA - Similar to Required, but also verifies the server Certificate Authority (CA) certificate against the configured CA certificates. The connection attempt fails if no valid matching CA certificates are found.
    • Verify Full - Similar to Verify CA, but also performs host name identity verification by checking the host name the client (i.e. Replicate) uses for connecting to the server against the identity in the certificate that the server sends to the client. The client checks whether the host name that it uses for connecting matches the Common Name value in the server certificate. The connection fails if there is a mismatch.
  • Client certificate path - The path to the client certificate requested by the server.
  • Secret key path - The path to the client private key file in PEM format.
  • CA path - The path to the Certificate Authority (CA) that issued the client certificate file in PEM format.
  • CRL path - The path to the CRL certificate. This file contains certificates revoked by certificate authorities. If the server certificate appears in this list, the connection will fail.
  • SSL compression -Select this option to compress the data before it is encrypted.

Did this page help you?

If you find any issues with this page or its content – a typo, a missing step, or a technical error – let us know how we can improve!