SQL Server
Connect & Ingest data from / to a SQL Server database
Sling CLI Setup
The following credentials keys are accepted:
host
(required) -> The hostname / ip of the instanceuser
(required) -> The username to access the instancedatabase
(required) -> The database name of the instanceinstance
(optional) -> The SQL Server instance to useschema
(optional) -> The default schema to usepassword
(optional) -> The password to access the instanceport
(optional) -> The port of the instance. Default is1433
.authenticator
(optional) -> Can be used to specify use of a registered authentication provider. (e.g.ntlm
,winsspi
(on windows) orkrb5
(on linux))ssh_tunnel
(optional) -> The URL of the SSH server you would like to use as a tunnel (examplessh://user:password@db.host:22
)ssh_private_key
(optional) -> The private key to use to access a SSH server (raw string or path to file).ssh_passphrase
(optional) -> The passphrase to use to access a SSH server.
Additional Parameters
Sling uses the go-mssqldb
library and thus will accept any paremters listed here. Some parameters that may be of interest:
encrypt
->strict
,disable
,false
ortrue
- whether data between client and server is encrypted.log
-> logging level (accepts1
,2
,4
,8
,16
,32
).trust_server_certificate
->true
orfalse
- whetherthe server certificate is checkedcertificate
-> The file that contains the public key certificate of the CA that signed the SQL Server certificate. The specified certificate overrides the go platform specific CA certificates.hostname_in_certificate
-> Specifies the Common Name (CN) in the server certificate. Default value is the server host.server_spn
(v1.2.3) -> The kerberos SPN (Service Principal Name) for the server. Default is MSSQLSvc/host:port.
Kerberos Parameters
Since v1.2.3
authenticator
- set this tokrb5
to enable kerberos authentication. If this is not present, the default provider would bentlm
for unix andwinsspi
for windows.krb5_config_file
(optional) - path to kerberos configuration file. Defaults to/etc/krb5.conf
. Can also be set usingKRB5_CONFIG
environment variable.krb5_realm
(required with keytab and raw credentials) - Domain name for kerberos authentication. Omit this parameter if the realm is part of the user name likeusername@REALM
.krb5_keytab_file
- path to Keytab file. Can also be set using environment variableKRB5_KTNAME
. If no parameter or environment variable is set, theDefaultClientKeytabName
value from the krb5 config file is used.krb5_cred_cache_file
- path to Credential cache. Can also be set using environment variableKRBCCNAME
.krb5_dns_lookup_kdc
- Optional parameter in all contexts. Set to lookup KDCs in DNS. Boolean. Default is true.krb5_udp_preference_limit
- Optional parameter in all contexts. 1 means to always use tcp. MIT krb5 has a default value of 1465, and it prevents user setting more than 32700. Integer. Default is 1.
Sling supports authentication via 3 methods. See here for more details.
Keytabs - Specify the username, keytab file, the krb5.conf file, and realm.
Credential Cache - Specify the krb5.conf file path and credential cache file path.
Raw credentials - Specity krb5.confg, Username, Password and Realm.
Here are examples of setting a connection named MSSQL
. We must provide the type=sqlserver
property:
Environment Variable
Sling Env File YAML
See here to learn more about the sling env.yaml
file.
If you are facing issues connecting, please reach out to us at support@slingdata.io, on discord or open a Github Issue here.
Last updated