Sybase Connection
In this article
See the Connector Marketplace topic. Please request your administrator to start a trial or subscribe to the Premium Sybase connector.
Sybase is a robust relational database management system known for its reliability and performance.
ASE Versions 12, 15, and 16 are supported. Connecting to Sybase SQL Anywhere or Sybase IQ are not supported.
This topic describes how to authenticate to Sybase and configure any necessary connection properties in the Sybase connection connector.
Prerequisites
To connect to the Sybase, specify the following connection properties:
Server: Set this to the name or network address of the Sybase database instance.
Database: Set this to the name of the Sybase database running on the specified Server.
Optionally, you can also secure your connections with TLS/SSL by setting UseSSL to true.
Authenticating to Sybase
Sybase supports several methods for authentication including basic, Kerberos, and, LDAP.
Basic
Set the AuthScheme to Basic and set the following connection properties to use Sybase authentication.
User: Set this to the username of the authenticating Sybase user.
Password: Set this to the username of the authenticating Sybase user.
LDAP
To connect with LDAP authentication, you will need to configure Sybase server-side to use the LDAP authentication mechanism.
After configuring Sybase for LDAP, you can connect using the same credentials as basic authentication.
Kerberos
To leverage Kerberos authentication, begin by enabling it via the following connection property:
- AuthScheme: Set to Kerberos will be used for authentication to Sybase.
Using Kerberos:
Authenticating to Sybase via Kerberos requires you to define authentication properties and to choose how Kerberos should retrieve authentication tickets.
Set Authentication Properties
To authenticate to Sybase using Kerberos, set these properties:
hive.server2.authentication: Kerberos.
AuthScheme: KERBEROS.
KerberosKDC: The host name or IP Address of your Kerberos KDC machine.
KerberosRealm: The realm of the Sybase Kerberos principal. Find this value immediately after the ‘@’ symbol of the principal value.
KerberosSPN: The service and host of the Sybase Kerberos Principal. Find this value just before the ‘@’ symbol of the principal value.
Connection Configuration
Each connection property available in the Sybase connector is explained below.
Connection Name
The name of the connection to be created should be provided. This is the name that will display on the list of available connections.
Connection Type
Option to choose between either connecting securely using SSH Tunnel or, proceed with a Direct Connection when connecting to Sybase.
If Connection Type value is SSH Tunnel, additional fields will be displayed.
To know more about SSH Tunneling with Gathr, see SSH Tunneling
SSH Tunnel
If SSH Tunnel
is selected, additional configuration parameters will get listed.
SSH Key
The SSH key should be provided to authenticate the associated SSH host and SSH user.
SSH Host
Public IP address of your SSH host.
SSH User
Default SSH username.
If Connection Type value is Direct Connection, then proceed by updating the following fields.
Server
The name of the server running Sybase Database.
Set this property to the name or network address of the Sybase database instance.
Port
The port of the Server hosting the Sybase Database.
User
The Sybase user account used to authenticate.
Password
The password used to authenticate the user.
Database
The name of the Sybase database running on the specified Server.
Charset
Chaeset name to communicate with server.
Alternate Servers
This property allows you to specify multiple servers in addition to the one configured in Server and Port . Specify both a server name and port; separate servers with a comma.
Example: Server=localhost;Port=27017;AlternateServers=localhost:27018,localhost:27019;
Browsable Schemas
This property restricts the schemas reported to a subset of the available schemas.
Example: BrowsableSchemas=SchemaA,SchemaB,SchemaC.
Listing the schemas from databases can be expensive. Providing a list of schemas in the connection string improves the performance.
Enable SSL
Option for creating the connection with SSL enabled.
Upload Keystore File
Option to upload keystore file.
Advanced Configurations
This section contains additional configuration parameters.
SwitchMode
This property allows you to specify a switching mode to select a server from AlternateServers as the active server.
There are three switching modes available:
None: Always use the default server.
Failover: When the active server cannot be accessed, another server in AlternateServers will be used as the active server.
LoadBalance: This option includes the feature of “Failover”. In addition, the active server will also be changed after a transcation is committed.
Switch Strategy
This property allows you to specify a switching strategy to select a server from AlternateServers as the active server.
There are three switching strategies available:
Sequence: Always use the next server in AlternateServers as the active server.
Random: Use a random server in AlternateServers as the active server.
BestResponse: Always use the server with the shortest response time.
Add Configuration: Additional properties can be added using this option as key-value pairs.
After entering all the details, click on the TEST button.
If the connection service identification and authentication details are provided correctly, a success message stating “connection available” is generated.
Click on the CREATE button to save the changes.
If the details are incorrect or the server is down, you will get a message “Connection unavailable”.
If you have any feedback on Gathr documentation, please email us!