Follow our setup guide to connect SQL Server database as a destination to Fivetran.
To connect SQL Server to Fivetran, you need the following:
- SQL Server Version 2012 or above
- IP (e.g.,
184.108.40.206) or host (
- Port (usually
- Access to your SQL Server through Fivetran’s IPs for your database’s region
- A Fivetran-specific SQL Server user with WRITE-level permissions
- Fivetran role with the Create Destinations or Manage Destinations permissions
IMPORTANT: We only support the Enterprise and Standard editions of SQL Server.
Choose connection method link
Decide whether to connect to your SQL Server database directly or using an SSH tunnel. For more information, see our destination connection options documentation.
If you connect directly, you must create a rule in a security group that allows Fivetran access to your database instance and port.
Configure your firewall and/or other access control systems to allow incoming connections to your host and port from Fivetran’s IPs for your database’s region.
Connect using an SSH tunnel
If you connect using an SSH tunnel, Fivetran connects to a separate server in your network that provides an SSH tunnel to your SQL Server database. You must then configure your tunnel server’s security group to allow Fivetran access and configure the instance’s security to allow access from the tunnel.
You must connect through SSH if your database is contained within an inaccessible subnet.
To connect using SSH, do the following:
In the destination setup form, select the Connect via an SSH tunnel option.
Copy Fivetran’s public SSH key.
Add the public key to the
authorized_keysfile of your SSH server. The key must be all on one line, so make sure that you don’t introduce any line breaks when cutting and pasting.
Enable TCP/IP link
Verify that your SQL Server database is configured to allow TCP/IP connections. To enable the TCP/IP protocol for your database instance:
Open SQL Server Configuration Manager.
In the navigation pane, click SQL Server Network Configuration, and then click Protocols for MyInstanceName.
NOTE: If you specified the default instance during installation, the instance name will be MSSQLSERVER.
In the right pane, verify that the TCP/IP protocol is Enabled. If the status is Disabled, right-click TCP/IP, and then click Enable.
Right-click TCP/IP and select Properties.
In the IP Addresses tab, go to the IPAll section.
In the TCP Port field enter 1433, and then click Apply.
On the warning dialog box, click OK, and then on the TCP/IP Properties dialog box, click OK.
In the navigation pane, expand SQL Native Client Configuration, and then click Client Protocols.
In the right pane, verify that TCP/IP is Enabled. If TCP/IP is Disabled, right-click TCP/IP, and then click Enable.
Right-click TCP/IP and select Properties. Verify that the Default Port field is set as 1433 and the Enabled field is set as Yes.
Click OK to exit the TCP/IP Properties dialog box.
In the navigation pane, click SQL Server Services.
In the right pane, right-click SQL Server (MyInstanceName), and then click Restart.
Verify SSL encryption link
- Open SQL Server Configuration Manager.
- In the navigation pane, expand SQL Server Network configuration.
- Select Protocols for MyInstanceName Properties.
- In the right pane, go to the Certificate tab and make sure that the encryption certificate is enabled.
See Microsoft’s documentation to enable encrypted connections to the database engine, if the certificate is not enabled.
NOTE: The certificate must be in PFX (.pfx) format. If not, the certificate will not be available in the Microsoft Management Console’s All Tasks > Manage Private Keys menu.
Create Fivetran userlink
Connect to your SQL Server database as an Admin user and execute the following SQL commands to create a user for Fivetran. Choose a memorable username (for example,
<database> with the name of your database and
<password> with a password of your choice:
USE; CREATE LOGIN fivetran WITH PASSWORD = '<password>'; CREATE USER fivetran FOR LOGIN fivetran;
Execute the following commands to grant the
CREATE permission for the database you would like Fivetran to sync:
GRANT CREATE SCHEMA TO fivetran; GRANT CREATE TABLE TO fivetran;
Complete Fivetran configuration link
- Log in to your Fivetran account.
- Go to the Manage Account page.
- In the Destinations tab, click +Destination.
- On the Add Destination To Fivetran page, enter a Destination Name of your choice.
- Click Add Destination.
- Select SQL Server as the destination type.
- In the destination setup form, enter the Host name or the IP address of the database server.
- Enter the Port number. For example,
- Enter the User name you created in Step 4.
- Enter your Password.
- Enter the Database name you want to replicate to.
- Choose your Connection method. You can choose to Connect directly or Connect via an SSH. If you choose Connect via an SSH tunnel, enter the following details:
- SSH Host
- SSH Port
- SSH User
- (Optional) Enable the Require TLS through tunnel toggle if you want to use TLS.
- Choose the Data processing location. Depending on the plan you are on and your selected cloud service provider, you may also need to choose a Cloud service provider and AWS region as described in our Destinations documentation.
- Choose your Timezone.
- Click Save & Test.
Fivetran tests and validates the SQL Server destination connection. On successful completion of the setup tests, you can sync your data using Fivetran connectors to the SQL Server destination.
Fivetran performs the following SQL Server connection tests:
The SSH Tunnel Test validates the SSH tunnel details you provided in the setup form and then checks the connectivity to the instance using the SSH Tunnel if you are connecting using an SSH tunnel.
The Database Host Connection Test validates the database credentials you provided in the setup form. The test verifies that the host is not private and then checks the connectivity to the host.
The Database Certificate Validation Test generates a pop-up window where you must choose which certificate you want Fivetran to use. The test then validates that certificate and checks that we can connect to your database using TLS. We skip this test if you aren’t connecting directly.
The SQL Server Connection Test checks if we can access your database.
The Permission Test checks that we have the correct permissions to create schemas and tables in your database.
The SQL Server Type Test validates the SQL Server service type. The test checks if your SQL Server implementation matches the destination type. For example, this test will fail if you try to set up a generic SQL Server destination using an Azure SQL database.
NOTE: The tests may take a couple of minutes to finish running.