Skip to main content

πŸ–‡ Ataccama Default Connections - Part 1️⃣

πŸ–‡ Ataccama Default Connections - Part 1️⃣
Forum|alt.badge.img+1

Hi everyone,


We often get questions on integrations and in this post you can find several technologies that Ataccama can connect to, the prerequisites for integration, key rules to follow, and fundamental troubleshooting steps.

πŸ‘‰ Understanding these aspects ensures a smoother deployment and operation, minimizing potential integration issues. By following the guidelines provided, you can efficiently prepare your environment, meet technical requirements, and troubleshoot common challenges, ensuring seamless connectivity with Ataccama solutions.

 

Ataccama comes with a set of default connections that work out of the box without requiring additional configuration. These connections include the most commonly used databases, cloud storage solutions, and other data sources, all pre-configured with the necessary drivers.

 

For the majority of default connections, no manual setup is required β€” Ataccama automatically includes and manages the appropriate JDBC or API drivers, ensuring seamless integration.

 

For most use cases, default connections provide a plug-and-play experience, allowing users to quickly establish connectivity without additional effort.


Ataccama out-of-the-box sources πŸ“¦

 

ONE Data

πŸ”— Datasources: Relational Databases - JDBC Connections

Create in Catalogue Items β†’ Sources


   MS SQL ServerπŸ‘‡

Show content

Ataccama supports connecting to Microsoft SQL Server, whether it is a standalone on-premises instance or a cloud-based service like Azure SQL Database or Azure Synapse Analytics.

For datasource connection, network access must be configured to allow connections via TCP/IP, typically on port 1433. Cloud-hosted instances may require additional firewall rules, private endpoints, or VPN access depending on security policies.

Port to open: 1433

Driver: provided mssql-jdbc-*.jar with mssqlLibs out-of-the-box within drivers.zip package

JDBC String pattern: jdbc:sqlserver://<hostname>:<port>;databaseName=<database>;encrypt=true;trustServerCertificate=true

Authentication options:

  • Username and password - A username and password are required to establish a connection to the JDBC datasource. Credentials are provided in the Ataccama UI and stored securely. A read-only user is sufficient, as Ataccama never writes back to the client’s datasource.
  • Integrated credentials - AD Authentication via Kerberos - Confirm with your Ataccama representative for more details on the connection setup.

πŸ“š Read more on our documentation

 

Azure Synapse AnalyticsπŸ‘‡

Show content

Azure Synapse Analytics (formerly SQL Data Warehouse) uses TCP port 1433 for JDBC connections. It requires access to the Synapse workspace endpoint, authentication via Azure AD, SQL authentication, or Managed Identity, and proper firewall/VNet rules to allow access from approved IPs or Azure services.

Port to open: 1433

Driver: provided mssql-jdbc-*.jar with mssqlLibs out-of-the-box within drivers.zip package

JDBC String pattern: jdbc:sqlserver://<hostname>:<port>;databaseName=<database>;encrypt=true;trustServerCertificate=true

Authentication options:

  • Username and password - A username and password are required to establish a connection to the JDBC datasource. Credentials are provided in the Ataccama UI and stored securely. A read-only user is sufficient, as Ataccama never writes back to the client’s datasource.

πŸ“š Read more on our documentation

 

OracleπŸ‘‡

Show content

For on-premises deployments, connections typically use TCP/IP with the Oracle Listener service, often running on port 1521. Cloud-based instances may require configuring security lists, private endpoints, or VPN access to allow external connections.

Port to open: 1521

Driver: provided ojdbc8-*.jar with ORACLElIBS out-of-the-box within drivers.zip package

JDBC String pattern: jdbc:oracle:thin:@<hostname>:<port>:<sid>

Authentication options:

  • Username and password - A username and password are required to establish a connection to the JDBC datasource. Credentials are provided in the Ataccama UI and stored securely. A read-only user is sufficient, as Ataccama never writes back to the client’s datasource.

πŸ“š Read more on our documentation

 

PostgreSQL (Amazon Aurora PostgreSQL, Amazon RDS PostgreSQL, Azure Service for PostgreSQL, Google Service for PostgreSQL) πŸ‘‡

Show content

Ataccama supports connections to PostgreSQL, including on-premises instances, managed cloud services (such as AWS RDS, Azure Database for PostgreSQL, and Google Cloud SQL), and self-hosted deployments.

For standalone deployments, a connection may require adjustments to the pg_hba.conf and postgresql.conf files to allow remote access.

Cloud-based services may require whitelisting IP addresses, configuring VPC settings, or enabling SSL connections depending on security policies.

PostgreSQL typically listens on port 5432.

Port to open: 5432

Driver: provided postgresql-*.jar out-of-the-box within drivers.zip package

JDBC String pattern: jdbc:postgresql://<hostname>:<port>/<database>

Authentication options:

  • Username and password - A username and password are required to establish a connection to the JDBC datasource. Credentials are provided in the Ataccama UI and stored securely. A read-only user is sufficient, as Ataccama never writes back to the client’s datasource.

πŸ“š Read more on our documentation

 

MariaDB πŸ‘‡

Show content

MariaDB uses the MySQL protocol and typically listens on port 3306.

For self-hosted or on-premises deployments, remote access may require modifying the bind-address setting in the MariaDB configuration and updating user privileges to allow external connections.

For cloud-based services, additional configurations such as IP whitelisting, VPC settings, or SSL enforcement may be required, depending on the security policies of the hosting provider.

Port to open: 3306

Driver: provided mariadb-java-client-*.jar out-of-the-box within drivers.zip package

JDBC String pattern: jdbc:mariadb://<hostname>:<port>/<database>

Authentication options:

  • Username and password - A username and password are required to establish a connection to the JDBC datasource. Credentials are provided in the Ataccama UI and stored securely. A read-only user is sufficient, as Ataccama never writes back to the client’s datasource.

πŸ“š Read more on our documentation


TeradataπŸ‘‡

Show content

Ataccama supports connections to Teradata, which is primarily used as an enterprise data warehouse (EDW) and can be deployed on-premises or as a cloud-based service via Teradata Vantage (available on AWS, Azure, and Google Cloud).

Teradata uses the Teradata SQL Engine and typically communicates via JDBC. The default port for connections is 1025 for JDBC access.

Teradata uses the Teradata SQL Engine and supports JDBC connections, which typically communicate over port 1025.

For on-premises Teradata, network access must be configured to allow external JDBC connections. For Teradata Vantage (Cloud), additional configurations such as SSL encryption, IAM roles, and IP whitelisting may be required.

Port to open: 1025

Driver: provided terajdbc-*.jar out-of-the-box within drivers.zip package

JDBC String pattern: jdbc:teradata://<hostname>/database=<database>,charset=UTF8

Authentication options:

  • Username and password - A username and password are required to establish a connection to the JDBC datasource. Credentials are provided in the Ataccama UI and stored securely. A read-only user is sufficient, as Ataccama never writes back to the client’s datasource.

πŸ“š Read more on our documentation

 

Amazon Redshift πŸ‘‡

Show content

Amazon Redshift uses TCP port 5439 by default and supports connections over JDBC. It requires access to the cluster's VPC security group and subnet settings, ensuring inbound rules allow connections from permitted IPs or VPCs. Redshift can be accessed via public or private endpoints, and for cross-region or external access, AWS PrivateLink or VPC peering may be required.

Port: 5439

Driver: provided redshift-jdbc*.jar out-of-the-box within drivers.zip package

JDBC String pattern: jdbc:redshift://<hostname>:<port>/<database>

Authentication options:

  • Username and password - A username and password are required to establish a connection to the JDBC datasource. Credentials are provided in the Ataccama UI and stored securely. A read-only user is sufficient, as Ataccama never writes back to the client’s datasource.

πŸ“š Read more on our documentation 

 

Snowflake πŸ‘‡

Show content

Snowflake uses TCP port 443 for secure connections over HTTPS and supports JDBC/ODBC drivers. It requires network policies to allow access from permitted IPs or PrivateLink for VPC integration. Depending on deployment (AWS, Azure, GCP), additional networking settings like egress rules or firewall configurations may be needed.

Port: 443

Driver: provided snowflake-jdbc-*.jar out-of-the-box within drivers.zip package

JDBC String pattern: jdbc:snowflake://<account_identifier>.snowflakecomputing.com/?db=<database>&schema=<schema>&warehouse=<warehouse>&role=<role>

Pushdown processing: To process Data Quality evaluation entirely using a warehouse cluster. When query pushdown processing is completed, only Data Quality results and invalid data samples are returned to ONE platform.

Authentication options:

  • Username and password - Is basically a Snowflake JWT (Private Key) method, a username and password in combination with Snowflake JWT authentication is supported

    • Configuration details

      Official Ataccama documentation: https://docs.ataccama.com/one/latest/sources/how-to-connect-to-snowflake-using-jwt-authentication.html

      Technical details:

      # Generate private key - correct way:
      openssl genrsa 2048 | openssl pkcs8 -topk8 -inform PEM -v1 PBE-SHA1-3DES -out rsa_private_key.p8
      
      # Generate public key from the private key:
      openssl rsa -in rsa_private_key.p8 -pubout -out publickey.crt
      
      # Set public key to Snowflake account:
      alter user "<username>" set rsa_public_key='<public key content>'
      
  • OAuth credentials - For Snowflake OAuth authentication, you need to provide Client ID, Client Secret, Token Endpoint, and a Refresh Token (generated in the Ataccama UI during setup). All credentials are stored securely upon saving.

  • OAuth user SSO credentials - For SSO authentication, the authentication method needs to be configured to enable seamless access.

πŸ“š Read more on our documentation

 

BigQuery πŸ‘‡

Show content

BigQuery uses HTTPS (port 443) for JDBC connections. It requires IAM authentication and access to the Google Cloud project where the dataset is stored. For authentication, OAuth2 or service account keys are typically required.

Port: 443

Driver: provided GoogleBigQueryJDBC42.jar with bigQuery:ibs out-of-the-box within drivers.zip package

JDBC String pattern: jdbc:bigquery://https://www.googleapis.com/bigquery/v2:443;ProjectId=<project_id>;Dataset=<dataset>;

Authentication options:

  • OAuth Google user credentials - Client ID and Client Secret need to be provided and are stored securely upon saving.

  • Google service account key credentials - the service account key file needs to be provided and is stored securely upon saving.

πŸ“š Read more on our documentation

 

SybaseπŸ‘‡

Show content

Sybase Adaptive Server Enterprise (ASE) typically uses TCP port 5000 (default) for connections and supports JDBC. It requires access to the Sybase server hostname/IP, database name, and authentication details. Secure access can be enforced using SSL/TLS and firewall rules.

Port: 5000

Driver: provided jtds-*.jar out-of-the-box within drivers.zip package

JDBC String pattern: jdbc:jtds:sybase://<hostname>:<port>;DatabaseName =<database>

Authentication options:

  • Username and password - A username and password are required to establish a connection to the JDBC datasource. Credentials are provided in the Ataccama UI and stored securely. A read-only user is sufficient, as Ataccama never writes back to the client’s datasource.

πŸ“š Read more on our documentation

 

Derby πŸ‘‡

Show content

Apache Derby is an embedded or client-server database that uses TCP port 1527 by default for network connections. It supports JDBC connections in both embedded and server modes.

Port: 1527

Driver: provided derbyclient-*.jar with derbyLibs out-of-the-box within drivers.zip package

JDBC String pattern: jdbc:derby:<database_path>;create=true

Authentication options:

  • Username and password - A username and password are required to establish a connection to the JDBC datasource. Credentials are provided in the Ataccama UI and stored securely. A read-only user is sufficient, as Ataccama never writes back to the client’s datasource.

 

Hope you find these useful! Let us know if you have any questions in the comments below.

Did this topic help you find an answer to your question?

Reply


Cookie policy

We use cookies to enhance and personalize your experience. If you accept you agree to our full cookie policy. Learn more about our cookies.

 
Cookie settings