@@ -184,97 +184,6 @@ with a unique name that you are free to choose (here, we have used
184184` host ` and ` port ` of the server. You can also supply connection credentials
185185and TLS/mTLS secrets here if you use them.
186186
187- ### Database-specific connection properties {#db-connect-props}
188-
189- Use the following properties in the [ ` sources.advanced.source ` ] ( #sources ) section
190- of ` config.yaml ` for more control over RDI's connection to your database.
191-
192- #### MySQL/MariaDB
193-
194- See the
195- [ Debezium SSL mode properties] ( https://debezium.io/documentation/reference/stable/connectors/mysql.html#mysql-property-database-ssl-mode )
196- for a full list of properties specific to MySQL/MariaDB.
197-
198- - [ ` database.ssl.keystore ` ] ( https://debezium.io/documentation/reference/stable/connectors/mysql.html#mysql-property-database-ssl-keystore ) :
199- (Optional) The location of the key store file. Use this for two-way authentication between
200- your client and the MySQL/MariaDB Server.
201- - [ ` database.ssl.keystore.password ` ] ( https://debezium.io/documentation/reference/stable/connectors/mysql.html#mysql-property-database-ssl-keystore-password ) :
202- (Optional) The password for the key store file. You only need this if you have also configured
203- ` database.ssl.keystore ` .
204- - [ ` database.ssl.truststore ` ] ( https://debezium.io/documentation/reference/stable/connectors/mysql.html#mysql-property-database-ssl-truststore ) :
205- The location of the trust store file to use for server certificate verification.
206- - [ ` database.ssl.truststore.password ` ] ( https://debezium.io/documentation/reference/stable/connectors/mysql.html#mysql-property-database-ssl-truststore-password ) :
207- The password for the trust store file. This is required both to check the integrity of the truststore
208- and to unlock it.
209-
210- #### PostgreSQL
211-
212- See the
213- [ Debezium connector properties] ( https://debezium.io/documentation/reference/stable/connectors/postgresql.html#postgresql-connector-properties )
214- for a full list of properties specific to PostgreSQL.
215-
216- - [ ` database.sslcert ` ] ( https://debezium.io/documentation/reference/stable/connectors/postgresql.html#postgresql-property-database-sslcert ) :
217- The file path for the client's SSL certificate for the client. See
218- [ Database Connection Control Functions] ( https://www.postgresql.org/docs/current/libpq-connect.html )
219- in the PostgreSQL docs for more information.
220- - [ ` database.sslkey ` ] ( https://debezium.io/documentation/reference/stable/connectors/postgresql.html#postgresql-property-database-sslkey ) :
221- The file path for the client's SSL private key. See
222- [ Database Connection Control Functions] ( https://www.postgresql.org/docs/current/libpq-connect.html )
223- in the PostgreSQL docs for more information.
224- - [ ` database.sslpassword ` ] ( https://debezium.io/documentation/reference/stable/connectors/postgresql.html#postgresql-property-database-sslpassword ) :
225- The password for the client's private key file as specified ` database.sslkey ` . See
226- [ Database Connection Control Functions] ( https://www.postgresql.org/docs/current/libpq-connect.html )
227- in the PostgreSQL docs for more information.
228- - [ ` database.sslrootcert ` ] ( https://debezium.io/documentation/reference/stable/connectors/postgresql.html#postgresql-property-database-sslrootcert ) :
229- The file path for the root certificate(s) used to validate the server. See
230- [ Database Connection Control Functions] ( https://www.postgresql.org/docs/current/libpq-connect.html )
231- in the PostgreSQL docs for more information.
232-
233- #### Oracle
234-
235- See the Kafka
236- [ configuration docs] ( https://kafka.apache.org/documentation.html#configuration )
237- for a full list of properties relevant to Oracle configuration.
238- Where a property has a ` <role> ` element, you can set the role to be
239- either ` producer ` or ` consumer ` , as appropriate.
240-
241- - [ ` schema.history.internal.<role>.security.protocol ` ] ( https://kafka.apache.org/documentation.html#consumerconfigs_security.protocol ) :
242- The protocol for communicating with brokers. This can take the values
243- ` PLAINTEXT ` , ` SSL ` , ` SASL_PLAINTEXT ` , and ` SASL_SSL ` .
244- - [ ` schema.history.internal.<role>.ssl.keystore.location ` ] ( https://kafka.apache.org/documentation.html#producerconfigs_ssl.keystore.location ) :
245- The file path for the keystore.
246- - [ ` schema.history.internal.<role>.ssl.keystore.password ` ] ( https://kafka.apache.org/documentation.html#producerconfigs_ssl.keystore.password ) :
247- The password for the keystore file. You only need this you have also set
248- ` schema.history.internal.<role>.ssl.keystore.location ` .
249- - [ ` schema.history.internal.<role>.ssl.truststore.location ` ] ( https://kafka.apache.org/documentation.html#producerconfigs_ssl.truststore.location ) :
250- The file path for the truststore.
251- - [ ` schema.history.internal.<role>.ssl.truststore.password ` ] ( https://kafka.apache.org/documentation.html#producerconfigs_ssl.truststore.password ) :
252- The password for the trust store file. If you don't set a password, RDI will still use the trust store
253- file specified in ` schema.history.internal.<role>.ssl.truststore.location ` but without integrity
254- checking.
255- - [ ` schema.history.internal.<role>.ssl.key.password ` ] ( https://kafka.apache.org/documentation.html#producerconfigs_ssl.key.password ) :
256- The password for the private key in the keystore file specified in
257- ` schema.history.internal.<role>.ssl.keystore.location ` .
258- - [ ` database.dbname ` ] ( https://debezium.io/documentation/reference/stable/connectors/oracle.html#oracle-property-database-dbname ) :
259- The name of the database you want to connect to. If you are using a container database environment,
260- then you should set this to the name of the root container database (CDB), rather than an included
261- pluggable database (PDB).
262- - [ ` database.pdb.name ` ] ( https://debezium.io/documentation/reference/stable/connectors/oracle.html#oracle-property-database-pdb-name ) :
263- The name of the Oracle pluggable database you want to connect to. You can only use this with
264- container database (CDB) installations.
265- - [ ` decimal.handling.mode ` ] ( https://debezium.io/documentation/reference/stable/connectors/oracle.html#oracle-property-decimal-handling-mode ) :
266- This specifies the data format for floating point values in ` NUMBER ` , ` DECIMAL ` and ` NUMERIC `
267- columns. This can take the values ` precise ` (store values with any number of decimal places),
268- ` double ` (use double-precision floating point), or ` string ` (encode numbers as strings).
269- The default value is ` precise ` . See
270- [ Oracle numeric types] ( https://debezium.io/documentation/reference/stable/connectors/oracle.html#oracle-numeric-types )
271- for more information about decimal handling.
272- - ` key.converter.schemas.enable ` and ` value.converter.schemas.enable ` :
273- Boolean values specifying whether or not you want to add JSON schemas to
274- serialized data. See Kafka's [ connect transforms] ( https://kafka.apache.org/documentation/#connect_transforms )
275- docs for an example.
276-
277-
278187## Job files
279188
280189You can optionally supply one or more job files that specify how you want to
0 commit comments