ON THIS PAGE
Azure Database for PostgreSQL is a relational database service based on the open-source Postgres database engine. It is a fully-managed, enterprise-ready community PostgreSQL database as a service that can handle mission-critical workloads with predictable performance, security, high availability, and dynamic scalability.
You can ingest data from your Azure PostgreSQL database using Hevo Pipelines and replicate it to a Destination of your choice.
- IP address or host name of your PostgreSQL database instance is available.
- The PostgreSQL version is 9.5 or higher.
- Log-based incremental replication is enabled, if Pipeline mode is Logical Replication.
- Hevo’s IP addresses are whitelisted.
- SELECT, USAGE, and CONNECT privileges are granted to the database user.
Setting up Log-based Incremental Replication
Hevo supports data ingestion from PostgreSQL servers via Write Ahead Logs set at the logical level (available on PostgreSQL version 9.4). A Write Ahead Log(WAL) is a collection of log files that record information about data modifications and data object modifications made on a PostgreSQL server instance. Typically WAL is used for data replication and data recovery.
By default, replication method is set to REPLICA. You must change this to LOGICAL. To do this:
Access the Microsoft Azure Portal.
Under Settings, click Replication.
In the right pane, select replication support as LOGICAL.
Click YES in the confirmation dialog to restart the Postgres server for the parameter changes to take effect.
Confirm under Notifications that your changes have been applied and server has restarted successfully before running the Pipeline, to avoid errors.
Whitelisting Hevo’s IP Addresses
You need to whitelist the Hevo IP addresses for your region to enable Hevo to connect to your PostgreSQL database. You can do this by creating firewall rules in your Microsoft Azure database settings as follows:
Access the Azure Portal.
Under Resources, select the database you want to synchronize with Hevo.
Under Settings, click Connection security.
Create a Firewall Rule:
- Specify a firewall rule Name.
Specify Hevo’s IP addresses in the Start IP and End IP fields as per your region.
Note: As Hevo has specific IP addresses and not a range, the value in the Start IP and End IP fields is the same.
- Click Save.
- Repeat this step to add the IP address for each applicable Hevo region.
Granting Privileges to a User
Grant privileges to the database user connecting to the PostgreSQL database as follows:
- Log in to your Microsoft Azure PostgreSQL database as a user with
Enter the following commands to give accesses to the database user:
GRANT CONNECT ON DATABASE <database_name> TO <database_username>;
GRANT USAGE ON DATABASE <database_name> TO <database_username>;
GRANT SELECT ON DATABASE <database_name> TO <database_username>;
- Alter the schema’s default privileges to grant
SELECTprivileges on tables to the database user
ALTER DEFAULT PRIVILEGES IN SCHEMA <schema_name>;
GRANT SELECT ON TABLES TO <database_username>;
Login using SSL not supported. This setting is enabled by default. You can disable it as follows:
- Under Settings, click Connection security.
- In SSL Settings on the right, set the toggle option for Enforce SSL connection to DISABLED.
- Click Save.
The data type Array in the Source is automatically mapped to Varchar at the Destination. No other mapping is currently supported.