Table of Contents

Search

  1. Preface
  2. Introduction to ODBC Connector
  3. Connections for ODBC
  4. Synchronization tasks with ODBC Connector
  5. Mappings and mapping tasks with ODBC Connector
  6. SQL ELT optimization
  7. Data type reference

ODBC Connector

ODBC Connector

Source SQL ELT optimization

Source
SQL ELT optimization

When you configure source
SQL ELT optimization
for a mapping, the Secure Agent analyzes the optimized mapping from the source to the target or until it reaches a downstream transformation that it cannot push to the source database.
The Secure Agent generates and executes a SELECT statement for each source that has transformation logic pushed down. Then, it reads the results of this SQL query and processes the remaining transformations in the mapping.
You can configure a mapping to use source
SQL ELT optimization
if the source and target reside in different databases.
For example, if a mapping contains a Teradata source and an Oracle target, you can configure source
SQL ELT optimization
to push some transformation logic for processing to the Teradata source.

0 COMMENTS

We’d like to hear from you!