configuration.asciidoc 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434
  1. [role="xpack"]
  2. [testenv="platinum"]
  3. [[sql-odbc-setup]]
  4. === Configuration
  5. Once the driver has been installed, in order for an application to be able to connect to {es} through ODBC, a set of configuration parameters must be provided to the driver. Depending on the application, there are generally three ways of providing these parameters:
  6. * through a connection string;
  7. * using a User DSN or System DSN;
  8. * through a File DSN.
  9. DSN (_data source name_) is a generic name given to the set of parameters an ODBC driver needs to connect to a database.
  10. We will refer to these parameters as _connection parameters_ or _DSN_ (despite some of these parameters configuring some other aspects of a driver's functions; e.g. logging, buffer sizes...).
  11. Using a DSN is the most widely used, simplest and safest way of performing the driver configuration. Constructing a connection string, on the other hand, is the most crude way and consequently the least common method.
  12. We will focus on DSN usage only.
  13. [[data-source-administrator]]
  14. ==== 1. Launching ODBC Data Source Administrator
  15. For DSN management, ODBC provides the _ODBC Data Source Administrator_ application, readily installed on all recent desktop Windows operating systems.
  16. - The 32-bit version of the Odbcad32.exe file is located in the `%systemdrive%\Windows\SysWoW64` folder.
  17. - The 64-bit version of the Odbcad32.exe file is located in the `%systemdrive%\Windows\System32` folder.
  18. To launch it, open the search menu - _Win + S_ - and type "ODBC Data Sources (64-bit)" or "ODBC Data Sources (32-bit)" and press _Enter_:
  19. [[launch_administrator]]
  20. .Launching ODBC Data Source Administrator
  21. image:images/sql/odbc/launch_administrator.png[]
  22. Once launched, you can verify that the driver was installed correctly by clicking on the _Drivers_ tab of the ODBC Data Source Administrator and checking that _Elasticsearch Driver_ is present in the list of installed drivers.
  23. You should also see the version number of the installed driver.
  24. [[administrator_drivers]]
  25. .Drivers tab
  26. image:images/sql/odbc/administrator_drivers.png[]
  27. [[dsn-configuration]]
  28. ==== 2. Configure a DSN
  29. The next step is to configure a DSN. You can choose between the following options mapped on the first three tabs of the Administrator application:
  30. * User DSN
  31. +
  32. The connections configured under this tab are only available to the currently logged in user. Each of these DSNs are referred to by a chosen arbitrary name (typically a host or cluster name).
  33. +
  34. The actual set of parameters making up the DSN is stored through the driver in the system registry. Thus, a user will later only need to provide an application with the DSN name in order to connect to the configured {es} instance.
  35. +
  36. * System DSN
  37. +
  38. Similar to a User DSN, except that the connections configured under this tab will be available to all the users configured on the system.
  39. * File DSN
  40. +
  41. This tab contains functionality that will allow to have one set of connection parameters written into a file, rather then the Registry.
  42. +
  43. Such a file can be then shared among multiple systems and the user will need to specify the path to it, in order to have the application connect to the configured {es} instance.
  44. The configuration steps are similar for all the above points. Following is an example of configuring a System DSN.
  45. [discrete]
  46. ===== 2.1 Launch {odbc} DSN Editor
  47. Click on the _System DSN_ tab, then on the _Add..._ button:
  48. [[system_add]]
  49. .Add a new DSN
  50. image:images/sql/odbc/administrator_system_add.png[]
  51. A new window will open, listing all available installed drivers. Click on _{es} Driver_, to highlight it, then on the _Finish_ button:
  52. [[launch_editor]]
  53. .Launch the DSN Editor
  54. image:images/sql/odbc/administrator_launch_editor.png[]
  55. This action closes the previously opened second window and open a new one instead, {odbc}'s DSN Editor:
  56. [[dsn_editor]]
  57. .{odbc} DSN Editor
  58. image:images/sql/odbc/dsn_editor_basic.png[]
  59. This new window has three tabs, each responsible for a set of configuration parameters, as follows.
  60. [discrete]
  61. [[connection_parameters]]
  62. ===== 2.2 Connection parameters
  63. This tab allows configuration for the following items:
  64. * Name
  65. +
  66. This is the name the DSN will be referred by.
  67. +
  68. NOTE: The characters available for this field are limited to the set permitted for a Registry key.
  69. +
  70. Example: _localhost_
  71. +
  72. * Description
  73. +
  74. This field allows a arbitrary text; generally used for short notes about the configured connection.
  75. +
  76. Example: _Clear-text connection to the local [::1]:9200._
  77. +
  78. * Cloud ID
  79. +
  80. The _Cloud ID_ is a string that simplifies the configuration when connecting to
  81. Elastic's Cloud {ess}; it is obtained from within the Cloud console of each
  82. {es} cluster and encodes the connection parameters to that cluster.
  83. +
  84. NOTE: When this field is provisioned, the _Hostname_, _Port_ and the security
  85. settings are provisioned as well and their respective inputs disabled.
  86. +
  87. * Hostname
  88. +
  89. This field requires an IP address or a resolvable DNS name of the {es} instance that the driver will connect to.
  90. +
  91. Example: _::1_
  92. +
  93. * Port
  94. +
  95. The port on which the {es} listens on.
  96. +
  97. NOTE: If left empty, the default *9200* port number will be used.
  98. +
  99. * Username, Password
  100. +
  101. If security is enabled, these fields will need to contain the credentials of the access user.
  102. At a minimum, the _Name_ and _Hostname_ fields must be provisioned, before the DSN can be saved.
  103. WARNING: Connection encryption is enabled by default. This will need to be changed if connecting to an {es} node with no encryption.
  104. [discrete]
  105. ===== 2.3 Cryptography parameters
  106. One of the following SSL options can be chosen:
  107. * Disabled. All communications unencrypted.
  108. +
  109. The communication between the driver and the {es} instance is performed over a clear-text connection.
  110. +
  111. WARNING: This setting can expose the access credentials to a 3rd party intercepting the network traffic and is not recommended.
  112. +
  113. * Enabled. Certificate not validated.
  114. +
  115. The connection encryption is enabled, but the certificate of the server is not validated.
  116. +
  117. This is currently the default setting.
  118. +
  119. NOTE: This setting allows a 3rd party to act with ease as a man-in-the-middle and thus intercept all communications.
  120. +
  121. * Enabled. Certificate is validated; hostname not validated.
  122. +
  123. The connection encryption is enabled and the driver verifies that server's certificate is valid, but it does *not* verify if the
  124. certificate is running on the server it was meant for.
  125. +
  126. NOTE: This setting allows a 3rd party that had access to server's certificate to act as a man-in-the-middle and thus intercept all the
  127. communications.
  128. +
  129. * Enabled. Certificate is validated; hostname validated.
  130. +
  131. The connection encryption is enabled and the driver verifies that both the certificate is valid, as well as that it is being deployed on
  132. the server that the certificate was meant for.
  133. +
  134. * Enabled. Certificate identity chain validated.
  135. +
  136. This setting is equivalent to the previous one, with one additional check against certificate's revocation. This offers the strongest
  137. security option and is the recommended setting for production deployments.
  138. +
  139. * Certificate File
  140. +
  141. In case the server uses a certificate that is not part of the PKI, for example using a self-signed certificate, you can configure the path to a X.509 certificate file that will be used by the driver to validate server's offered certificate.
  142. +
  143. The driver will only read the contents of the file just before a connection is attempted. See <<connection_testing>> section further on how to check the validity of the provided parameters.
  144. +
  145. NOTE: The certificate file can not be bundled or password protected since the driver will not prompt for a password.
  146. +
  147. If using the file browser to locate the certificate - by pressing the _Browse..._ button - only files with _.pem_ and _.der_ extensions
  148. will be considered by default. Choose _All Files (\*.*)_ from the drop down, if your file ends with a different extension:
  149. +
  150. [[dsn_editor_cert]]
  151. .Certificate file browser
  152. image:images/sql/odbc/dsn_editor_security_cert.png[]
  153. [discrete]
  154. ===== 2.4 Proxy parameters
  155. If connecting to the {es} node needs to go through a proxy, the following parameters need to be configured:
  156. * Type
  157. +
  158. What kind of protocol to use when connecting to the proxy host. This also mandates how the {es} node you want to connect to over the proxy needs to be specified under <<connection_parameters>>:
  159. +
  160. ** HTTP, SOCKS4A, SOCKS5H: either IP address or host name is accepted; the proxy will resolve the DNS name;
  161. ** SOCKS4, SOCKS5: {es} node location needs to be provided as an IP address;
  162. +
  163. * Port
  164. +
  165. The TCP port the proxy is listening for connections on.
  166. * Username
  167. +
  168. The user part of the credentials used to authenticate to the proxy.
  169. * Password
  170. +
  171. The password part of the credentials for the proxy.
  172. [[dsn_editor_proxy]]
  173. .Proxy parameters
  174. image:images/sql/odbc/dsn_editor_proxy.png[]
  175. [discrete]
  176. ===== 2.5 Connection parameters
  177. The connection configuration can further be tweaked by the following parameters.
  178. * Request timeout (s)
  179. +
  180. The maximum time (in seconds) a request to the server can take. This can be
  181. overridden by a larger statement-level timeout setting. The value 0 means no
  182. timeout.
  183. +
  184. * Max page size (rows)
  185. +
  186. The maximum number of rows that {es-sql} server should send the driver for one
  187. page. This corresponds to {es-sql}'s request parameter `fetch_size` (see
  188. <<sql-rest-fields>>). The value 0 means server default.
  189. +
  190. * Max page length (MB)
  191. +
  192. The maximum size (in megabytes) that an answer can grow to, before being
  193. rejected as too large by the driver.
  194. This is concerning the HTTP answer body of one page, not the cumulated data
  195. volume that a query might generate.
  196. +
  197. * Varchar limit
  198. +
  199. The maximum width of the string columns.
  200. If this setting is greater than zero, the driver will advertise all the string
  201. type columns as having a maximum character length equal to this value and will
  202. truncate any longer string to it. The string types are textual fields
  203. (TEXT, KEYWORD etc.) and some specialized fields (IP, the GEOs etc.). Note that
  204. no interpretation of the value is performed before truncation, which can lead
  205. to invalid values if the limit is set too low.
  206. This is required for those applications that do not support column lengths as
  207. large as {es} fields can be.
  208. +
  209. * Floats format
  210. +
  211. Controls how the floating point numbers will be printed, when these are
  212. converted to string by the driver. Possible values given to this parameter:
  213. +
  214. ** `scientific`: the exponential notation (ex.: 1.23E01);
  215. ** `default`: the default notation (ex.: 12.3);
  216. ** `auto`: the driver will choose one of the above depending on the value to be
  217. printed.
  218. Note that the number of decimals is dependent on the precision (or ODBC scale)
  219. of the value being printed and varies with the different floating point types
  220. supported by {es-sql}.
  221. This setting is not effective when the application fetches from the driver the
  222. values as numbers and then does the conversion subsequently itself.
  223. +
  224. * Data encoding
  225. +
  226. This value controls which data format to encode the REST content in. Possible
  227. values are:
  228. +
  229. ** `CBOR`: use the Concise Binary Object Representation format. This is the
  230. preferred encoding, given its more compact format.
  231. ** `JSON`: use the JavaScript Object Notation format. This format is more
  232. verbose, but easier to read, especially useful if troubleshooting.
  233. +
  234. * Data compression
  235. +
  236. This setting controls if and when the REST content - encoded in one of the above
  237. formats - is going to be compressed. The possible values are:
  238. ** `on`: enables the compression;
  239. ** `off`: disables the compression;
  240. ** `auto`: enables the compression, except for the case when the data flows
  241. through a secure connection; since in this case the encryption layer employs
  242. its own data compression and there can be security implications when an
  243. additional compression is enabled, the setting should be kept to this value.
  244. +
  245. * Follow HTTP redirects
  246. +
  247. Should the driver follow HTTP redirects of the requests to the server?
  248. +
  249. * Use local timezone
  250. +
  251. This setting controlls the timezone of:
  252. +
  253. ** the context in which the query will execute (especially relevant for functions dealing with timestamp components);
  254. ** the timestamps received from / sent to the server.
  255. +
  256. If disabled, the UTC timezone will apply; otherwise, the local machine's set
  257. timezone.
  258. +
  259. * Auto-escape PVAs
  260. +
  261. The pattern-value arguments make use of `_` and `%` as special characters to
  262. build patern matching values. Some applications however use these chars as
  263. regular ones, which can lead to {es-sql} returning more data than the app
  264. intended. With the auto escaping, the driver will inspect the arguments and
  265. will escape these special characters if not already done by the application.
  266. +
  267. * Multi value field lenient
  268. +
  269. This setting controls the behavior of the server in case a
  270. multi-value field is queried. In case this is set and the server encounters
  271. such a field, it will pick a value in the set - without any guarantees of what
  272. that will be, but typically the first in natural ascending order - and return
  273. it as the value for the column. If not set, the server will return an error.
  274. This corresponds to {es-sql}'s request parameter `field_multi_value_leniency`
  275. (see <<sql-rest-fields>>).
  276. +
  277. * Include frozen indices
  278. +
  279. If this parameter is `true`, the server will include the frozen indices in the
  280. query execution.
  281. This corresponds to {es-sql}'s request parameter `index_include_frozen`
  282. +
  283. * Early query execution
  284. +
  285. If this configuration is set, the driver will execute a statement as soon as the
  286. application submits it for preparation - i.e. early - and is functionally
  287. equivalent to a direct execution. This will only happen if the query lacks
  288. parameters. Early execution is useful with those applications that inspect the
  289. result before actually executing the query. {es-sql} lacks a preparation API,
  290. so early execution is required for interoperability with these applications.
  291. [[dsn_editor_misc]]
  292. .Connection parameters
  293. image:images/sql/odbc/dsn_editor_misc.png[]
  294. [discrete]
  295. ===== 2.6 Logging parameters
  296. For troubleshooting purposes, the {odbc} offers functionality to log the API calls that an application makes; this is enabled in the Administrator application:
  297. [[administrator_tracing]]
  298. .Enable Application ODBC API logging
  299. image:images/sql/odbc/administrator_tracing.png[]
  300. However, this only logs the ODBC API calls made by the application into the _Driver Manager_ and not those made by the _Driver Manager_ into the driver itself. To enable logging of the calls that the driver receives, as well as internal driver processing events, you can enable driver's logging on Editor's _Logging_ tab:
  301. * Enable Logging?
  302. +
  303. Ticking this will enable driver's logging. A logging directory is also mandatory when this option is enabled (see the next option).
  304. However the specified logging directory will be saved in the DSN if provided, even if logging is disabled.
  305. +
  306. * Log Directory
  307. +
  308. Here is to specify which directory to write the log files in.
  309. +
  310. NOTE: The driver will create *one log file per connection*, for those connections that generate logging messages.
  311. +
  312. * Log Level
  313. +
  314. Configure the verbosity of the logs.
  315. +
  316. [[administrator_logging]]
  317. .Enable driver logging
  318. image:images/sql/odbc/dsn_editor_logging.png[]
  319. +
  320. When authentication is enabled, the password will be redacted from the logs.
  321. NOTE: Debug-logging can quickly lead to the creation of many very large files and generate significant processing overhead. Only enable if
  322. instructed so and preferably only when fetching low volumes of data.
  323. [discrete]
  324. [[connection_testing]]
  325. ===== 2.7 Testing the connection
  326. Once the _Hostname_, the _Port_ (if different from implicit default) and the SSL options are configured, you can test if the provided
  327. parameters are correct by pressing the _Test Connection_ button. This will instruct the driver to connect to the {es} instance and perform
  328. a simple SQL test query. (This will thus require a running {es} instance with the SQL plugin enabled.)
  329. [[dsn_editor_conntest]]
  330. .Connection testing
  331. image:images/sql/odbc/dsn_editor_conntest.png[]
  332. NOTE: When connection testing, all the configured parameters are taken into account, including the logging configuration. This will allow
  333. early detection of potential file/directory access rights conflicts.
  334. See <<alternative_logging>> section further for an alternative way of configuring the logging.
  335. [[available-dsn]]
  336. ==== 3. DSN is available
  337. Once everything is in place, pressing the _Save_ button will store the configuration into the chosen destination (Registry or file).
  338. Before saving a DSN configuration the provided file/directory paths are verified to be valid on the current system. The DSN editor
  339. will however not verify in any way the validity or reachability of the configured _Hostname_ : _Port_. See <<connection_testing>>
  340. for an exhaustive check.
  341. If everything is correct, the name of the newly created DSN will be listed as available to use:
  342. [[system_added]]
  343. .Connection added
  344. image:images/sql/odbc/administrator_system_added.png[]
  345. [[alternative_logging]]
  346. ==== Alternative logging configuration
  347. Due to the specification of the ODBC API, the driver will receive the configured DSN parameters - including the logging ones - only once a
  348. connection API is invoked (such as _SQLConnect_ or _SQLDriverConnect_). The _Driver Manager_ will however always make a set of API calls
  349. into the driver before attempting to establish a connection. To capture those calls as well, one needs to pass logging configuration
  350. parameters in an alternative way. The {odbc} will use an environment variable for this purpose.
  351. Configuring an environment variable is OS specific and not detailed in this guide. Whether the variable should be configured system-wide
  352. or user-specific depends on the way the ODBC-enabled application is being run and if logging should affect the current user only or not.
  353. The definition of the environment variable needs to be done as follows:
  354. * Name: _ESODBC_LOG_DIR_
  355. * Value: [path](?[level]), where:
  356. +
  357. [path] is the path to the directory where the log files will be written into;
  358. +
  359. [level] is optional and can take one of the following values: _debug_, _info_, _warn_, _error_; if not provided, _debug_ is assumed.
  360. [[env_var_logging]]
  361. .Logging environment variable
  362. image:images/sql/odbc/env_var_log.png[]
  363. NOTE: When enabling the logging through the environment variable, the driver will create *one log file per process*.
  364. Both ways of configuring the logging can coexist and both can use the same
  365. destination logging directory. However, one logging message will only be logged
  366. once, the connection logging taking precedence over the environment variable
  367. logging.