, it pushes all the transformation logic in the mapping to the target database.
You can configure full
SQL ELT optimization
only when the source and target are in the same database.
When you configure full
SQL ELT optimization
, the Secure Agent attempts to push all transformation logic in the mapping to the target database. If the Secure Agent cannot push all transformation logic to the database, it performs both source-side and target-side
SQL ELT optimization
.
When you run a mapping configured for full
SQL ELT optimization
, the Secure Agent analyzes the mapping from the source to the target or until it reaches a downstream transformation it cannot push to the target database. It generates and executes SQL statements against the source or target based on the transformation logic it can push to the database.