Category: Database Connectors
Introduction
This document is created to help setup a mindzieDataDesigner connector to PostgreSQL database. The mindzieDataDesigner is the ETL tool used by mindzieStudio to convert database tables to process mining event logs. The purpose of this document is to help creating the connection string and opening ports on the firewall if required.
Overview
The PostgreSQL connector provides high-performance connectivity to PostgreSQL databases using the Npgsql data provider. This connector supports advanced PostgreSQL features and is optimized for analytical workloads common in process mining.
System Requirements
- Database System: PostgreSQL 10 or later (PostgreSQL 15+ recommended)
- Cloud Support: Amazon RDS for PostgreSQL, Azure Database for PostgreSQL, Google Cloud SQL
- Platform Support: Windows, Linux, macOS
- Dependencies: Npgsql .NET data provider - included with connector
Connection String Format
Basic Format
Host=hostname;Port=5432;Database=database_name;Username=username;Password=password;
Connection Parameters
| Parameter | Description | Required | Example |
|---|---|---|---|
Host or Server |
PostgreSQL server hostname | Yes | postgres.company.com |
Port |
Server port number | No | 5432 (default) |
Database |
Database name | Yes | process_mining |
Username or User ID |
PostgreSQL username | Yes | mindzie_user |
Password |
PostgreSQL password | Yes | SecurePassword123 |
Timeout |
Connection timeout (seconds) | No | 30 |
Command Timeout |
Command timeout (seconds) | No | 600 |
Pooling |
Enable connection pooling | No | true |
Minimum Pool Size |
Minimum pool connections | No | 1 |
Maximum Pool Size |
Maximum pool connections | No | 100 |
SSL Mode |
SSL connection mode | No | Prefer |
Trust Server Certificate |
Trust SSL certificate | No | false |
Connection Examples
Local PostgreSQL
Host=localhost;Port=5432;Database=process_mining;Username=mindzie_user;Password=password;
Remote PostgreSQL with SSL
Host=postgres.company.com;Port=5432;Database=process_mining;Username=mindzie_user;Password=SecurePassword123;SSL Mode=Require;
Amazon RDS PostgreSQL
Host=myinstance.123456789012.us-east-1.rds.amazonaws.com;Port=5432;Database=process_mining;Username=postgres;Password=RDSPassword123;SSL Mode=Require;
Azure Database for PostgreSQL
Host=myserver.postgres.database.azure.com;Port=5432;Database=process_mining;Username=mindzie@myserver;Password=AzurePassword123;SSL Mode=Require;
Connection with Pool Settings
Host=postgres-server;Port=5432;Database=process_mining;Username=mindzie_user;Password=password;
Pooling=true;Minimum Pool Size=5;Maximum Pool Size=50;Timeout=30;
Troubleshooting
Common Connection Issues
"Connection refused" Error
- Verify PostgreSQL is running:
systemctl status postgresql - Check server hostname and port number
- Validate firewall and network connectivity
- Ensure PostgreSQL accepts connections: check
listen_addresses
"Authentication failed" Error
- Verify username and password are correct
- Check pg_hba.conf authentication configuration
- Ensure user exists:
\duin psql - Verify authentication method (md5, scram-sha-256)
"Database does not exist" Error
- Verify database name:
\lin psql - Check user has CONNECT privileges to database
- Ensure database is spelled correctly (case sensitive)
SSL Connection Issues
- Check PostgreSQL SSL configuration
- Verify SSL certificates if using Require mode
- Use SSL Mode=Prefer for automatic SSL negotiation
- Check Trust Server Certificate setting
Cloud-Specific Configurations
Amazon RDS PostgreSQL
- Use RDS endpoint as hostname
- Configure security groups for network access
- Enable SSL connections for data protection
Azure Database for PostgreSQL
- Use fully qualified server names
- Include @servername in username for single server
- Configure firewall rules for client access
- Enable connection security features
mindzie Server Access: For enhanced security, you can configure your firewall to only allow connections from mindzie servers by whitelisting specific IP addresses. Contact mindzie support to obtain the current IP addresses for the mindzie servers you are using.
Google Cloud SQL PostgreSQL
- Configure authorized networks or use Cloud SQL Proxy
- Enable SSL certificates for secure connections
- Use private IP for enhanced security
Related Information
- Official Documentation: PostgreSQL Documentation
- Npgsql Provider: Npgsql Documentation
- Performance Tuning: PostgreSQL Performance Tips
- Security: PostgreSQL Security
💡 Tip: Leverage PostgreSQL's advanced analytical functions like window functions and CTEs for complex process mining queries that can be executed directly in the database for better performance.