The Designer Cloud Powered by Trifacta® platform can be configured to access data stored in relational database sources over JDBC protocol. When this connection method is used, individual database tables and views can be imported as datasets.
Supported Relational Databases
The Designer Cloud Powered by Trifacta platform can connect to these relational database platforms. Supported versions are the following:
- Oracle 188.8.131.52
- SQL Server 12.0.4
- PostgreSQL 9.3.10
NOTE: To enable Teradata connections, you must download and install Teradata drivers first. For more information, see Enable Teradata Connections.
For any relational source to which you are connecting, the Alteryx node must be able to access it through the specified host and port value.
Please contact your database administrator for the host and port information.
This feature is enabled automatically.
To prevent users from connecting to relational datasources for importing datasets and writing results, please complete the following configuration changes:
NOTE: Disabling this feature hides existing relational connections.
- You apply this change through the Workspace Settings Page. For more information, see Platform Configuration Methods.
Locate the following setting:
- Set this value to
Disable relational publishing
By default, relational connections are read/write, which means that users can create connections that enable writing back to source databases.
- When this feature is enabled, writeback is enabled for all natively supported relational connection types. See Connection Types.
- Depending on the connection type, the Designer Cloud Powered by Trifacta platform writes its data to different field types in the target database. For more information, see Type Conversions.
- Some limitations apply to relational writeback. See Limitations below.
As needed, you can disable this feature.
- You can apply this change through the Admin Settings Page (recommended) or
trifacta-conf.json. For more information, see Platform Configuration Methods.
Locate the following parameter and set it to
- Save changes and restart the platform.
Publishing through relational connections is disabled.
- You cannot swap relational sources if they are from databases provided by different vendors. See Flow View Page.
There are some differences in behavior between reading tables and views. See Using Databases.
Limitations on relational publishing:
When the relational publishing feature is enabled, it is automatically enabled for all platform-native connection types. You cannot disable relational publishing for Oracle, SQL Server, PostgreSQL, or Teradata connection types. Before you enable, please verify that all user accounts accessing databases of these types have appropriate permissions.
NOTE: Writing back to the database utilizes the same user credentials and therefore permissions as reading from it. Please verify that the users who are creating read/write relational connections have appropriate access.
- You cannot ad-hoc publish to a relational target. Relational publishing is only supported through the Run Job page.
- You write to multiple relational outputs from the same job only if they are from the same vendor.
- For example, if you have two SQL Server connections A and B, you can write one set of results to A and another set of results to B for the same job.
- If A and B are from different database vendors, you cannot write to them from the same job.
Execution at scale
Jobs for large-scale relational sources can be executed on the Spark running environment. After the data source has been imported and wrangled, no additional configuration is required to execute at scale.
NOTE: End-to-end performance is likely to be impacted by:
- streaming data volumes over 1 TB from the source,
- streaming from multiple concurrent sources,
- overall network bandwidth.
When the job is completed, any temporary files are automatically removed from HDFS.
For more information, see Run Job Page.
Password Encryption Key File
Relational database passwords are encrypted using key files:
- Passwords in transit: The platform uses a proprietary encryption key that is invoked each time a relational password is shared among platform services.
- Passwords at rest: For creating connections to your relational sources, you must create and reference your own encryption key file. This encryption key is accessing your relational connections from the web application. For more information, see Create Encryption Key File.
For more information, see Configure Security for Relational Connections.
Configure at least one individual connection for any of the supported relational systems. You can configure more than one connection to the same relational system using different credentials. See Connection Types.
Enable SSO Connections
If you have enabled Kerberos on the Hadoop cluster, you can leverage the Kerberos global keytab to enable SSO connections to relational sources. See Enable SSO for Relational Connections.
This page has no comments.