Postgresql

Category: Database Connectors

Introduction

This document is created to help setup a mindzieDataDesigner connector to PostgreSQL database. The mindzieDataDesigner is the ETL tool used by mindzieStudio to convert database tables to process mining event logs. The purpose of this document is to help creating the connection string and opening ports on the firewall if required.

Overview

The PostgreSQL connector provides high-performance connectivity to PostgreSQL databases using the Npgsql data provider. This connector supports advanced PostgreSQL features and is optimized for analytical workloads common in process mining.

System Requirements

  • Database System: PostgreSQL 10 or later (PostgreSQL 15+ recommended)
  • Cloud Support: Amazon RDS for PostgreSQL, Azure Database for PostgreSQL, Google Cloud SQL
  • Platform Support: Windows, Linux, macOS
  • Dependencies: Npgsql .NET data provider - included with connector

Connection String Format

Basic Format

Host=hostname;Port=5432;Database=database_name;Username=username;Password=password;

Connection Parameters

Parameter Description Required Example
Host or Server PostgreSQL server hostname Yes postgres.company.com
Port Server port number No 5432 (default)
Database Database name Yes process_mining
Username or User ID PostgreSQL username Yes mindzie_user
Password PostgreSQL password Yes SecurePassword123
Timeout Connection timeout (seconds) No 30
Command Timeout Command timeout (seconds) No 600
Pooling Enable connection pooling No true
Minimum Pool Size Minimum pool connections No 1
Maximum Pool Size Maximum pool connections No 100
SSL Mode SSL connection mode No Prefer
Trust Server Certificate Trust SSL certificate No false

Connection Examples

Local PostgreSQL

Host=localhost;Port=5432;Database=process_mining;Username=mindzie_user;Password=password;

Remote PostgreSQL with SSL

Host=postgres.company.com;Port=5432;Database=process_mining;Username=mindzie_user;Password=SecurePassword123;SSL Mode=Require;

Amazon RDS PostgreSQL

Host=myinstance.123456789012.us-east-1.rds.amazonaws.com;Port=5432;Database=process_mining;Username=postgres;Password=RDSPassword123;SSL Mode=Require;

Azure Database for PostgreSQL

Host=myserver.postgres.database.azure.com;Port=5432;Database=process_mining;Username=mindzie@myserver;Password=AzurePassword123;SSL Mode=Require;

Connection with Pool Settings

Host=postgres-server;Port=5432;Database=process_mining;Username=mindzie_user;Password=password;
Pooling=true;Minimum Pool Size=5;Maximum Pool Size=50;Timeout=30;

Troubleshooting

Common Connection Issues

"Connection refused" Error

  • Verify PostgreSQL is running: systemctl status postgresql
  • Check server hostname and port number
  • Validate firewall and network connectivity
  • Ensure PostgreSQL accepts connections: check listen_addresses

"Authentication failed" Error

  • Verify username and password are correct
  • Check pg_hba.conf authentication configuration
  • Ensure user exists: \du in psql
  • Verify authentication method (md5, scram-sha-256)

"Database does not exist" Error

  • Verify database name: \l in psql
  • Check user has CONNECT privileges to database
  • Ensure database is spelled correctly (case sensitive)

SSL Connection Issues

  • Check PostgreSQL SSL configuration
  • Verify SSL certificates if using Require mode
  • Use SSL Mode=Prefer for automatic SSL negotiation
  • Check Trust Server Certificate setting

Cloud-Specific Configurations

Amazon RDS PostgreSQL

  • Use RDS endpoint as hostname
  • Configure security groups for network access
  • Enable SSL connections for data protection

Azure Database for PostgreSQL

  • Use fully qualified server names
  • Include @servername in username for single server
  • Configure firewall rules for client access
  • Enable connection security features

mindzie Server Access: For enhanced security, you can configure your firewall to only allow connections from mindzie servers by whitelisting specific IP addresses. Contact mindzie support to obtain the current IP addresses for the mindzie servers you are using.

Google Cloud SQL PostgreSQL

  • Configure authorized networks or use Cloud SQL Proxy
  • Enable SSL certificates for secure connections
  • Use private IP for enhanced security

💡 Tip: Leverage PostgreSQL's advanced analytical functions like window functions and CTEs for complex process mining queries that can be executed directly in the database for better performance.

An error has occurred. This application may no longer respond until reloaded. Reload ??