Skip to content

Commit 35d52e9

Browse files
DOC-4169 removed DB connect props section on request
1 parent 879996d commit 35d52e9

File tree

1 file changed

+0
-91
lines changed

1 file changed

+0
-91
lines changed

content/integrate/redis-data-integration/ingest/data-pipelines/data-pipelines.md

Lines changed: 0 additions & 91 deletions
Original file line numberDiff line numberDiff line change
@@ -184,97 +184,6 @@ with a unique name that you are free to choose (here, we have used
184184
`host` and `port` of the server. You can also supply connection credentials
185185
and TLS/mTLS secrets here if you use them.
186186

187-
### Database-specific connection properties {#db-connect-props}
188-
189-
Use the following properties in the [`sources.advanced.source`](#sources) section
190-
of `config.yaml` for more control over RDI's connection to your database.
191-
192-
#### MySQL/MariaDB
193-
194-
See the
195-
[Debezium SSL mode properties](https://debezium.io/documentation/reference/stable/connectors/mysql.html#mysql-property-database-ssl-mode)
196-
for a full list of properties specific to MySQL/MariaDB.
197-
198-
- [`database.ssl.keystore`](https://debezium.io/documentation/reference/stable/connectors/mysql.html#mysql-property-database-ssl-keystore):
199-
(Optional) The location of the key store file. Use this for two-way authentication between
200-
your client and the MySQL/MariaDB Server.
201-
- [`database.ssl.keystore.password`](https://debezium.io/documentation/reference/stable/connectors/mysql.html#mysql-property-database-ssl-keystore-password):
202-
(Optional) The password for the key store file. You only need this if you have also configured
203-
`database.ssl.keystore`.
204-
- [`database.ssl.truststore`](https://debezium.io/documentation/reference/stable/connectors/mysql.html#mysql-property-database-ssl-truststore):
205-
The location of the trust store file to use for server certificate verification.
206-
- [`database.ssl.truststore.password`](https://debezium.io/documentation/reference/stable/connectors/mysql.html#mysql-property-database-ssl-truststore-password):
207-
The password for the trust store file. This is required both to check the integrity of the truststore
208-
and to unlock it.
209-
210-
#### PostgreSQL
211-
212-
See the
213-
[Debezium connector properties](https://debezium.io/documentation/reference/stable/connectors/postgresql.html#postgresql-connector-properties)
214-
for a full list of properties specific to PostgreSQL.
215-
216-
- [`database.sslcert`](https://debezium.io/documentation/reference/stable/connectors/postgresql.html#postgresql-property-database-sslcert):
217-
The file path for the client's SSL certificate for the client. See
218-
[Database Connection Control Functions](https://www.postgresql.org/docs/current/libpq-connect.html)
219-
in the PostgreSQL docs for more information.
220-
- [`database.sslkey`](https://debezium.io/documentation/reference/stable/connectors/postgresql.html#postgresql-property-database-sslkey):
221-
The file path for the client's SSL private key. See
222-
[Database Connection Control Functions](https://www.postgresql.org/docs/current/libpq-connect.html)
223-
in the PostgreSQL docs for more information.
224-
- [`database.sslpassword`](https://debezium.io/documentation/reference/stable/connectors/postgresql.html#postgresql-property-database-sslpassword):
225-
The password for the client's private key file as specified `database.sslkey`. See
226-
[Database Connection Control Functions](https://www.postgresql.org/docs/current/libpq-connect.html)
227-
in the PostgreSQL docs for more information.
228-
- [`database.sslrootcert`](https://debezium.io/documentation/reference/stable/connectors/postgresql.html#postgresql-property-database-sslrootcert):
229-
The file path for the root certificate(s) used to validate the server. See
230-
[Database Connection Control Functions](https://www.postgresql.org/docs/current/libpq-connect.html)
231-
in the PostgreSQL docs for more information.
232-
233-
#### Oracle
234-
235-
See the Kafka
236-
[configuration docs](https://kafka.apache.org/documentation.html#configuration)
237-
for a full list of properties relevant to Oracle configuration.
238-
Where a property has a `<role>` element, you can set the role to be
239-
either `producer` or `consumer`, as appropriate.
240-
241-
- [`schema.history.internal.<role>.security.protocol`](https://kafka.apache.org/documentation.html#consumerconfigs_security.protocol):
242-
The protocol for communicating with brokers. This can take the values
243-
`PLAINTEXT`, `SSL`, `SASL_PLAINTEXT`, and `SASL_SSL`.
244-
- [`schema.history.internal.<role>.ssl.keystore.location`](https://kafka.apache.org/documentation.html#producerconfigs_ssl.keystore.location):
245-
The file path for the keystore.
246-
- [`schema.history.internal.<role>.ssl.keystore.password`](https://kafka.apache.org/documentation.html#producerconfigs_ssl.keystore.password):
247-
The password for the keystore file. You only need this you have also set
248-
`schema.history.internal.<role>.ssl.keystore.location`.
249-
- [`schema.history.internal.<role>.ssl.truststore.location`](https://kafka.apache.org/documentation.html#producerconfigs_ssl.truststore.location):
250-
The file path for the truststore.
251-
- [`schema.history.internal.<role>.ssl.truststore.password`](https://kafka.apache.org/documentation.html#producerconfigs_ssl.truststore.password):
252-
The password for the trust store file. If you don't set a password, RDI will still use the trust store
253-
file specified in `schema.history.internal.<role>.ssl.truststore.location` but without integrity
254-
checking.
255-
- [`schema.history.internal.<role>.ssl.key.password`](https://kafka.apache.org/documentation.html#producerconfigs_ssl.key.password):
256-
The password for the private key in the keystore file specified in
257-
`schema.history.internal.<role>.ssl.keystore.location`.
258-
- [`database.dbname`](https://debezium.io/documentation/reference/stable/connectors/oracle.html#oracle-property-database-dbname):
259-
The name of the database you want to connect to. If you are using a container database environment,
260-
then you should set this to the name of the root container database (CDB), rather than an included
261-
pluggable database (PDB).
262-
- [`database.pdb.name`](https://debezium.io/documentation/reference/stable/connectors/oracle.html#oracle-property-database-pdb-name):
263-
The name of the Oracle pluggable database you want to connect to. You can only use this with
264-
container database (CDB) installations.
265-
- [`decimal.handling.mode`](https://debezium.io/documentation/reference/stable/connectors/oracle.html#oracle-property-decimal-handling-mode):
266-
This specifies the data format for floating point values in `NUMBER`, `DECIMAL` and `NUMERIC`
267-
columns. This can take the values `precise` (store values with any number of decimal places),
268-
`double` (use double-precision floating point), or `string` (encode numbers as strings).
269-
The default value is `precise`. See
270-
[Oracle numeric types](https://debezium.io/documentation/reference/stable/connectors/oracle.html#oracle-numeric-types)
271-
for more information about decimal handling.
272-
- `key.converter.schemas.enable` and `value.converter.schemas.enable`:
273-
Boolean values specifying whether or not you want to add JSON schemas to
274-
serialized data. See Kafka's [connect transforms](https://kafka.apache.org/documentation/#connect_transforms)
275-
docs for an example.
276-
277-
278187
## Job files
279188

280189
You can optionally supply one or more job files that specify how you want to

0 commit comments

Comments
 (0)