Oracle E-Business Suite Setup Guide
Follow our setup guide to connect Oracle E-Business Suite (EBS) to Fivetran. This connector extracts data directly from the underlying Oracle database and shares the same behavior and limitations as our Oracle connector.
Before you set up this connection, we recommend reading our Oracle connector overview. It describes supported configurations, features, incremental sync methods, known limitations, schema management, and data sync behavior.
You need to complete several steps in your database and network environment before you can finish the configuration in the Fivetran setup form.
Prerequisites
To connect Fivetran to your Oracle EBS database, you need:
- A Fivetran account with an Enterprise or Business Critical plan
- Oracle 11g R2 - 21c
- The Direct connection method is not supported for Oracle 12.1 or below
- The Binary Log Reader is supported for Oracle 12c or above only
- Your database host's IP (e.g.,
1.2.3.4) or domain (e.g.,your.server.com) - Your database's port (usually
1521for unencrypted connections and2484for encrypted connections using SSL/TLS) - Your database's system identifier (SID)/service name
Setup instructions
Choose connection method
Decide on your preferred method for connecting Fivetran to your Oracle EBS database, and then configure the necessary settings for that method. This connector supports the following connection methods:
Connect directly
Fivetran connects directly to your Oracle EBS database. This is the simplest connection method to set up, requiring minimal configuration.
This connection method is not supported for Oracle 12.1 or below. For these versions, you must choose SSH tunnel, private networking, or Proxy Agent instead.
To connect directly, you must do the following:
Enable TLS on your Oracle EBS database. Follow Oracle's instructions to enable TLS on your database either with a client wallet or without a client wallet.
Configure your firewall and/or other access control systems to allow incoming connections to your Oracle EBS database host and port (usually
1521) from Fivetran's IPs for your database's region. How you do this will vary based on how your Oracle EBS database is hosted (cloud platform, on-premises, etc.).
Connect via SSH
Fivetran connects to a separate server in your network that provides an SSH tunnel to your Oracle EBS database. You must connect through SSH if your database is in an inaccessible subnet.
To connect using SSH tunnel, you must do the following:
Configure an SSH tunnel between Fivetran and your Oracle EBS database. For more information, see our SSH connection setup documentation.
(Optional) Enable TLS on your Oracle EBS database if you want to use end-to-end encryption using TLS. Follow Oracle's instructions to enable TLS on your database either with a client wallet or without a client wallet.
Connect using private networking
Private networking enables communication between private networks and services without exposing traffic to the public internet. Private networking is the most secure connection method.
You must have a Business Critical plan to use private networking.
We support the following providers:
AWS PrivateLink – used for VPCs and AWS-hosted or on-premises services. For more information about setting up a private networking connection using AWS PrivateLink, see our AWS PrivateLink setup documentation.
Azure Private Link – used for Virtual Networks (VNets) and Azure-hosted or on-premises services. For more information about setting up a private networking connection using Azure Private Link, see our Azure PrivateLink setup documentation.
Google Cloud Private Service Connect – used for VPCs and Google-hosted or on-premises services. For more information about setting up a private networking connection using Google Cloud Private Service Connect, see our Google Cloud Private Service Connect setup documentation.
Connect using Proxy Agent
Fivetran connects to your database through the Proxy Agent, providing secure communication between Fivetran processes and your database host. The Proxy Agent is installed in your network and creates an outbound network connection to the Fivetran-managed SaaS.
To learn more about the Proxy Agent, how to install it, and how to configure it, see our Proxy Agent documentation.
Create user
Create a database user for Fivetran's exclusive use.
Connect to your Oracle database as an Admin user.
Execute the following SQL command to create a user for Fivetran and grant it permission to connect to your database. Replace
<username>,<password>and<profile_name>with a username, password, and profile name of your choice.Names in Oracle are case-sensitive. For example,
fivetranis not the same user asFIVETRAN.Follow the instructions below for your database type:
CREATE PROFILE <profile_name> LIMIT SESSIONS_PER_USER 10; CREATE USER <username> IDENTIFIED BY <password>; ALTER USER <username> PROFILE <profile_name>; GRANT CREATE SESSION TO <username>;Check your profile name with the following query:
SELECT USERNAME, PROFILE FROM DBA_USERS where USERNAME='<username>';You must have at least 10 sessions for your Fivetran user
If your incremental sync method is Binary Log Reader, you must create the user in the pluggable database (PDB) and grant the following permissions:
You must have at least 10 sessions for your Fivetran user
CREATE PROFILE <profile_name> LIMIT SESSIONS_PER_USER 10; CREATE USER <username> IDENTIFIED BY <password>; ALTER USER <username> PROFILE <profile_name>; GRANT CREATE SESSION TO <username>;If your incremental sync method is LogMiner or Fivetran Teleport Sync, you must create a common user at the container level.
Expand for instructions
The LogMiner incremental sync method is sunset and is no longer available for new Oracle connections.
Create the user with the container as the active session and grant the following permissions:
- Multitenant container database usernames must start with
C##because they are common users. - Your Fivetran user must have at least 10 sessions per user in both a container database (CDB) and a pluggable database.
ALTER SESSION SET CONTAINER=CDB$ROOT; CREATE PROFILE <profile_name> LIMIT SESSIONS_PER_USER 10; CREATE USER <username> IDENTIFIED BY <password> CONTAINER=ALL; ALTER USER <username> PROFILE <profile_name>; GRANT CREATE SESSION, ALTER SESSION, SET CONTAINER TO <username> CONTAINER=ALL; ALTER USER <username> SET CONTAINER_DATA=ALL CONTAINER=CURRENT;- Multitenant container database usernames must start with
Run the following command at the container level and the pluggable level to check the parameter:
COL USERNAME FOR A12 COL PROFILE FOR A19 COL LIMIT FOR A12 SET LINES 299 SELECT A.USERNAME, B.PROFILE, B.RESOURCE_NAME, B.LIMIT FROM DBA_USERS A,DBA_PROFILES B WHERE A.PROFILE = B.PROFILE AND B.RESOURCE_NAME = 'SESSIONS_PER_USER' AND A.USERNAME = <username>;
Grant read-only access
Grant the Fivetran user read-only access to the data you want to sync.
Oracle database defaults to using upper case letters, unless the values are surrounded by double quotes.
Grant the Fivetran user
SELECTpermission for the schemas and tables you want to sync. Follow the instructions below for your database type:Grant
SELECTpermissions on each table that you want Fivetran to access.GRANT SELECT ON "<schemaA>"."<tableA>" TO <username>; GRANT SELECT ON "<schemaA>"."<tableB>" TO <username>; GRANT SELECT ON "<schemaB>"."<tableC>" TO <username>;Alternatively, you can grant access to all tables.
GRANT SELECT ANY TABLE TO <username>;Execute the following
ALTERcommand before granting permissions. Replace<PDB>with the name of the pluggable database (PDB) that you want to connect to Fivetran.ALTER SESSION SET CONTAINER=<PDB>;Grant
SELECTpermissions on each table that you want Fivetran to access.GRANT SELECT ON "<schemaA>"."<tableA>" TO <username>; GRANT SELECT ON "<schemaA>"."<tableB>" TO <username>; GRANT SELECT ON "<schemaB>"."<tableC>" TO <username>;Alternatively, you can grant access to all tables.
GRANT SELECT ANY TABLE TO <username>;
Grant the Fivetran user access to system views. We use these views to optimize our initial import queries. Which system views you grant access to depend on the incremental sync method you want to use.
If your incremental sync method is Binary Log Reader, grant the Fivetran user access to the
DBA_SEGMENTSsystem view.GRANT SELECT ON DBA_SEGMENTS TO <username>;If your incremental sync method is LogMiner or Fivetran Teleport Sync, grant the Fivetran user access to the
DBA_EXTENTS,DBA_TABLESPACES, andDBA_SEGMENTSsystem views.The LogMiner incremental sync method is sunset and is no longer available for new Oracle connections.
GRANT SELECT ON DBA_EXTENTS TO <username>; GRANT SELECT ON DBA_TABLESPACES TO <username>; GRANT SELECT ON DBA_SEGMENTS TO <username>;
Configure incremental sync method
To keep your data up to date after the initial sync, choose and configure the incremental sync method that you want to use. These methods track recent data changes so Fivetran updates only data that has changed since the last sync. For guidance on choosing the right sync method that best fits your requirements, see our LogMiner vs Binary Log Reader vs Fivetran Teleport Sync documentation.
Follow the instructions below for your incremental sync method:
Binary Log Reader
Enable Binary Log Reader
To enable Binary Log Reader, do the following:
Connect to your Oracle database as an admin user.
If
ARCHIVELOGmode is not enabled on your database, enableARCHIVELOGmode. For multitenant container databases, execute these commands at the CDB level (ALTER SESSION SET CONTAINER=CDB$ROOT).We recommend that you set
ARCHIVE_LAG_TARGETto a non-zero value to reduce the lag in changes being synced.Enabling
ARCHIVELOGmode requires the Oracle instance to be briefly taken offline. To learn more, see Oracle's Managing Archived Redo Log Files documentation.SHUTDOWN IMMEDIATE; STARTUP MOUNT; ALTER DATABASE ARCHIVELOG; ALTER DATABASE OPEN;Configure Oracle RMAN to retain backups and archive logs for at least 24 hours. We recommend retaining data for seven days.
CONFIGURE RETENTION POLICY TO RECOVERY WINDOW OF 7 DAYS;(Recommended) Set the
DB_RECOVERY_FILE_DEST_SIZEparameter to a value that matches your available disk space, because expired and obsolete log and backup files can quickly fill your disk. For more information, see Oracle's DB_RECOVERY_FILE_DEST_SIZE documentation.Enable database-level minimal supplemental logging. For multitenant container databases, execute this command at the CDB level.
ALTER DATABASE ADD SUPPLEMENTAL LOG DATA;If you are also enabling supplemental logging at the table-level for
PRIMARY KEYcolumns or forALLcolumns on tables that include a primary key, enable it only after the table is created. Do not include the supplemental logging clause within theCREATE TABLEstatement, as Oracle may not properly log the primary key columns in such cases. Instead, create the table first and then enable supplemental logging using anALTER TABLEcommand. For example,CREATE TABLE "<schema>"."<table>" ... (<columns>, ...); ALTER TABLE "<schema>"."<table>" ADD SUPPLEMENTAL LOG DATA (<PRIMARY KEY | ALL>) COLUMNS;Grant the following
SELECTpermissions to the Fivetran user. For multitenant container databases, execute these commands at the PDB level (ALTER SESSION SET CONTAINER=<PDB>).GRANT SELECT ON SYS.V_$PDBS TO <username>; GRANT SELECT ON SYS.COL$ TO <username>; GRANT SELECT ON SYS.V_$DATABASE TO <username>; GRANT SELECT ON SYS.V_$ARCHIVED_LOG TO <username>; GRANT SELECT ON SYS.V_$TRANSACTION TO <username>; GRANT SELECT ON SYS.V_$PARAMETER TO <username>; GRANT SELECT ON SYS.V_$ENCRYPTED_TABLESPACES to <username>; GRANT SELECT ON SYS.V_$TABLESPACE to <username>;(Optional) Grant the Fivetran user permission to capture from partitioned tables. For multitenant container databases, execute these commands at the PDB level (
ALTER SESSION SET CONTAINER=<PDB>).GRANT SELECT ON SYS.TABPART$ to <username>; GRANT SELECT ON SYS.TABCOMPART$ to <username>; GRANT SELECT ON SYS.TABSUBPART$ to <username>;Configure the archive redo log file access based on how your Oracle database stores logs.
If your Oracle database is not configured with the fast recovery area, the archive log directory may remain constant (e.g.,
/u01/app/oracle/product/19c/dbhome_1). If your archive log directory remains constant, you must manually create a DIRECTORY object so Fivetran can access log files without requiring dynamic directory management.Run the following command to create the
DIRECTORYobject. For multitenant container databases, execute these commands at the PDB level.CREATE DIRECTORY FIVETRAN_LOGDIR AS ‘<your-archive-log-directory-full-path>’; GRANT READ ON DIRECTORY FIVETRAN_LOGDIR to <username>;If your Oracle database is configured with the fast recovery area, the archive log directory changes dynamically each day (e.g.,
/u01/app/oracle/fast_recovery_area/ORCLCDB/archivelog/2025_01_25). To avoid manually creatingDIRECTORYobjects ahead of time, grant the Fivetran user permission to create and drop them dynamically for each sync. Choose one of the following methods:Method 1: Grant direct privileges
Grant the Fivetran user permission to create and drop
DIRECTORYobjects. For multitenant container databases, execute these commands at the PDB level.GRANT CREATE ANY DIRECTORY TO <username>; GRANT DROP ANY DIRECTORY TO <username>;Method 2: Install a predefined package
If you prefer not to grant direct privileges, you can use the following stored procedure package (
FIVETRAN_BFILE) to controlDIRECTORYobject creation and deletion. Ensure to replace<username>with your Fivetran username. For multitenant container databases, execute these commands at the PDB level.CREATE OR REPLACE PACKAGE FIVETRAN_BFILE AUTHID DEFINER AS PROCEDURE dir_create(dirobj_name VARCHAR2, directory_name VARCHAR2); PROCEDURE dir_remove(dirobj_name VARCHAR2); END FIVETRAN_BFILE; / CREATE OR REPLACE PACKAGE BODY FIVETRAN_BFILE AS PROCEDURE dir_create(dirobj_name VARCHAR2, directory_name VARCHAR2) IS user_id VARCHAR2(256); BEGIN EXECUTE IMMEDIATE 'CREATE OR REPLACE DIRECTORY ' || dirobj_name || ' AS ''' || directory_name || ''''; user_id := USER; EXECUTE IMMEDIATE 'GRANT READ ON DIRECTORY ' || dirobj_name || ' TO ' || user_id; END; PROCEDURE dir_remove(dirobj_name VARCHAR2) IS BEGIN EXECUTE IMMEDIATE 'DROP DIRECTORY ' || dirobj_name; END; END FIVETRAN_BFILE; / CREATE OR REPLACE PUBLIC SYNONYM PKG_FIVETRAN_BFILE FOR SYS.FIVETRAN_BFILE; GRANT EXECUTE ON PKG_FIVETRAN_BFILE TO <username>;(Optional) If your Oracle database uses TDE, grant the following permissions to the Fivetran database user. For multitenant (CDB/PDB) environments, grant them at the CDB level to a CDB-level user instead.
GRANT SELECT ON SYS.V_$ENCRYPTION_WALLET to <username>;If column-level encryption is used:
GRANT SELECT ON SYS.ENC$ to <username>;(Optional) If you want to capture from Oracle databases that store archived redo logs in ASM, grant the following permissions to the Fivetran database user. For multitenant container databases, execute these commands at the PDB level.
GRANT EXECUTE ON SYS.DBMS_FILE_TRANSFER TO <username>; GRANT EXECUTE ON SYS.UTL_FILE TO <username>;For more information about how Binary Log Reader works with ASM, see our Automatic Storage Management (ASM) documentation.
If your archive log directory remains constant (Fixed archive log directory), create a staging directory and grant read/write access to the Fivetran database user:
The operating system user (e.g.,
oracle) running the Oracle database process must have read and write permissions on the underlying file system path of the staging directory.CREATE DIRECTORY FIVETRAN_ASM_STG_DIR AS '<asm_staging_directory_path>'; GRANT READ, WRITE ON DIRECTORY FIVETRAN_ASM_STG_DIR TO <username>;
LogMinerSunset
Enable LogMiner
The LogMiner incremental sync method is no longer available for new Oracle EBS connections. This section is only relevant if you're already using a LogMiner-based connection. If not, you can ignore it.
To enable LogMiner, do the following:
If
ARCHIVELOGmode is not enabled on your database, enableARCHIVELOGmode. We recommend that you setARCHIVE_LAG_TARGETto a non-zero value to reduce the lag in changes being synced.Enabling
ARCHIVELOGmode requires the Oracle instance to be briefly taken offline. To learn more, see Oracle's Managing Archived Redo Log Files documentation.SHUTDOWN IMMEDIATE; STARTUP MOUNT; ALTER DATABASE ARCHIVELOG; ALTER DATABASE OPEN;Configure Oracle RMAN to retain backups and archive logs for at least 24 hours. We recommend retaining data for seven days.
CONFIGURE RETENTION POLICY TO RECOVERY WINDOW OF 7 DAYS;(Recommended) Set the
DB_RECOVERY_FILE_DEST_SIZEparameter to a value that matches your available disk space, because expired and obsolete log and backup files can quickly fill your disk. For more information, see Oracle's DB_RECOVERY_FILE_DEST_SIZE documentation.Enable supplemental logging. For more information, see Oracle's LogMiner and Supplemental Logging documentation. Choose one of the logging options below and follow the corresponding instructions:
Database-level minimal supplemental logging with table-level identification key logging
We recommend using this option because it minimizes the overhead on your source database. According to Oracle's Database-Level Supplemental Logging documentation, "minimal supplemental logging does not impose significant overhead on the database that generates the redo log files".
Enable minimal supplemental logging by executing the following SQL statement. Minimal supplemental logging ensures that LogMiner has sufficient information to process the redo operations associated with DML changes.
ALTER DATABASE ADD SUPPLEMENTAL LOG DATA;Once minimal supplemental logging has been enabled at the database level, you must enable either
PRIMARY KEYidentification logging orALLsupplemental logging.To enable
PRIMARY KEYsupplemental logging only for specific tables, run the following SQL statement for each table:You need to enable
ALLsupplemental logging only for tables without a primary key and for tables whose primary key or composite primary key values are expected to changeALTER TABLE "<schema>"."<table>" ADD SUPPLEMENTAL LOG DATA (PRIMARY KEY) COLUMNS;To enable
ALLsupplemental logging only for specific tables, run the following SQL statement for each table:With
ALLsupplemental logging, if a row is updated, all of the columns associated with that row are placed in the redo log file.ALTER TABLE "<schema>"."<table>" ADD SUPPLEMENTAL LOG DATA (ALL) COLUMNS;
Database-level identification key logging
Enable either
PRIMARY KEYidentification logging orALLsupplemental logging at the database level if you want to enable logging for the entire database. For more information, see Oracle's Database-Level Identification Key Logging documentation.To enable
PRIMARY KEYsupplemental logging at the database level, run the following SQL statement:ALTER DATABASE ADD SUPPLEMENTAL LOG DATA (PRIMARY KEY) COLUMNS;To enable
ALLsupplemental logging at the database level, run the following SQL statement:You need to enable
ALLsupplemental logging only for tables without a primary key and for tables whose primary key or composite primary key values are expected to changeALTER DATABASE ADD SUPPLEMENTAL LOG DATA (ALL) COLUMNS;
If you don't configure the logging data correctly, you will receive a warning when Fivetran encounters a primary key change. The warning includes instructions to resolve the issue
Grant the Fivetran user permission to run LogMiner. Follow the instructions below for your database type:
GRANT SELECT ON SYS.V_$PARAMETER TO <username>; GRANT SELECT ON SYS.V_$ARCHIVED_LOG TO <username>; GRANT SELECT ON SYS.V_$LOGMNR_CONTENTS TO <username>; GRANT SELECT ON SYS.V_$DATABASE TO <username>; GRANT EXECUTE ON DBMS_LOGMNR TO <username>; GRANT EXECUTE ON DBMS_LOGMNR_D TO <username>; GRANT SELECT ANY TRANSACTION TO <username>; GRANT EXECUTE_CATALOG_ROLE TO <username>;Execute the following
ALTERcommand before granting access to LogMiner.ALTER SESSION SET CONTAINER=CDB$ROOT;GRANT SELECT ON SYS.V_$PARAMETER TO <username>; GRANT SELECT ON SYS.V_$ARCHIVED_LOG TO <username>; GRANT SELECT ON SYS.V_$ARCHIVE_DEST TO <username>; GRANT SELECT ON SYS.V_$LOGMNR_CONTENTS TO <username>; GRANT SELECT ON SYS.V_$DATABASE TO <username>; GRANT EXECUTE ON DBMS_LOGMNR TO <username>; GRANT EXECUTE ON DBMS_LOGMNR_D TO <username>; GRANT SELECT ANY TRANSACTION TO <username>; GRANT EXECUTE_CATALOG_ROLE TO <username>;(Oracle version 12 and above) Grant logmining permissions to the Fivetran user.
GRANT LOGMINING TO <username>;(Optional) Grant permissions to additional system tables.
We recommend granting these permissions to optimize the connection's performance and reliability.
GRANT SELECT ON DBA_FREE_SPACE TO <username>; GRANT SELECT ON SYS.V_$LOG TO <username>; GRANT SELECT ON SYS.V_$TEMPFILE TO <username>; GRANT SELECT ON SYS.V_$DATAFILE TO <username>;Execute the following
ALTERcommand before granting access.ALTER SESSION SET CONTAINER=CDB$ROOT;GRANT SELECT ON DBA_FREE_SPACE TO <username>; GRANT SELECT ON SYS.V_$LOG TO <username>; GRANT SELECT ON SYS.V_$TEMPFILE TO <username>; GRANT SELECT ON SYS.V_$DATAFILE TO <username>;
Finish Fivetran configuration
Complete the connector setup by entering the required information in the Fivetran setup form.
In your connection setup form, enter a Destination schema prefix. This prefix applies to each replicated schema and cannot be changed once your connection is created.
In the Destination schema names field, choose the naming convention you want Fivetran to use for the schemas, tables, and columns in your destination:
- Source naming: Preserves the original schema, table, and column names from the source system in your destination.
- Fivetran naming: Standardizes the schema, table, and column names in your destination according to the Fivetran naming conventions.
If you want to modify your selection, make sure you do it before you start the initial sync.
Depending on your selection, we will either prefix the connection name to each replicated schema or use the source schema names instead.
In the Host field, enter your database host's IP (for example,
1.2.3.4) or URL (for example,your.server.com).In the Port field, enter your database's port number. The port number is usually
1521for unencrypted connections and2484for encrypted connections using SSL/TLS.In the User field, enter the username of the Fivetran-specific user that you created.
In Oracle, usernames are case-sensitive. Make sure to enter the exact username.
In the Password field, enter the password for the Fivetran-specific user.
In the Update Method field, select the incremental sync method that you want to use: Read Changes via Binary Log Reader or Detect Changes via Fivetran Teleport Sync.
In the SID/Service Name field, enter your database's SID or service name.
(Multitenant container databases only, not applicable to Binary Log Reader) In the PDB Name field, enter your database's PDB name.
(Hybrid Deployment only) If your destination is configured for Hybrid Deployment, the Hybrid Deployment Agent associated with your destination is pre-selected for the connection. To assign a different agent, click Replace agent, select the agent you want to use, and click Use Agent.
From the Connection method drop-down, select how Fivetran connects to your database and enter the required information:
Connect directly
Connect via an SSH tunnel
- In the SSH Host field, enter the hostname or IP address of the SSH server. Do not use a load balancer IP address or hostname.
- In the SSH Port field, enter the port used by the SSH server.
- In the SSH User field, enter the username of the SSH user.
- If you enabled TLS on your database in Step 1, keep the Require TLS through Tunnel toggle turned ON.
Connect via private networking
- If you enabled TLS on your database in Step 1, keep the Require TLS when using Private Networking toggle turned ON.
Connect via Proxy Agent
- Select an existing Proxy Agent or configure a new one.
- If you enabled TLS on your database in Step 1, keep the Require TLS when using Proxy Agent toggle turned ON.
(Optional and applicable to Binary Log Reader only) Set the Using TDE Encryption toggle to ON if your Oracle database uses Transparent Data Encryption (TDE). For example, any replicated tables or columns are encrypted.
Enter the following, as applicable:
- TDE Wallet Password - Required only for a password-based software wallet.
- CDB User and CDB Password - For multitenant (CDB) databases, provide CDB-level credentials; leave blank for non-CDB databases.
- CDB SID/Service Name - For multitenant databases, enter the CDB root service name (not the PDB); leave blank for non-CDB databases.
- Local Auto-Login Wallet User Name/Host Name - Required only for local Auto-Login wallets; provide the OS user and the host name used when the wallet was created.
(Optional and applicable to Binary Log Reader only)Set the Using Symbolic Links toggle to ON if any directory path in Oracle, such as archive/redo log directories or the TDE wallet location, includes a symbolic link. This option lets you add one or more path mappings to specify how each symbolic link path corresponds to its real file system path.
Then click Add mapping to enter values in the following fields:- Source Directory Path - The path containing the symbolic link.
- Mapped Physical Path - The real path on the file system that the symbolic link points to.
For example, if
/var/foois a symbolic link to/yyy/zzz, and the log directory is/var/foo/xxx, set Source Directory Path to/var/fooand Mapped Physical Path to/yyy/zzz. The real directory path in this case is/yyy/zzz/xxx.For Oracle running on Windows, you don't need to enable Using Symbolic Links. Windows resolves symbolic links natively, so Binary Log Reader does not require any path mappings.
(Optional and applicable to Binary Log Reader only) Set the Using ASM toggle to ON to enable Fivetran to read archived redo logs stored in ASM.
- In the ASM Staging Directory Path field, enter the directory path to store the temporary files created while capturing changes from an Oracle database that uses ASM using Binary Log Reader. Do not use a symbolic link for the staging directory. For more information about how Binary Log Reader works with ASM, see our Automatic Storage Management (ASM) documentation.
(Not applicable to Hybrid Deployment) Copy the Fivetran's IP addresses (or CIDR) that you must safelist in your firewall.
Click Save & Test. Fivetran tests and validates our connection to your Oracle database. Upon successful completion of the setup tests, you can sync your data using Fivetran.
Setup tests
Fivetran performs the following tests to ensure that we can connect to your Oracle EBS database and that it is properly configured:
- The Validating Archive Log Access Test checks that we can access your archive log.
- The Validating Archive Log Retention Period Test verifies that your archive log is set to retain at least 24 hours' worth of changes.
- The Access to Database-Level Supplemental Logging Test verifies that supplemental logging is enabled on your database. If supplemental logging is not enabled, the test passes but generates a warning message in your dashboard.