Skip to content

Conversation

@willdonnelly
Copy link
Member

Description:

Just a quick edit of the source-sqlserver docs for source-sqlserver-ct, and updated "when to use this connector" sections for all three connectors.

Part of estuary/connectors#3470

@willdonnelly willdonnelly requested review from a team and aeluce January 20, 2026 16:53
@willdonnelly willdonnelly added the change:planned This is a planned change label Jan 20, 2026
@willdonnelly willdonnelly changed the title Wgd/2026 01 20 source sqlserver ct docs source-sqlserver-ct: New connector docs and updated "when to use" Jan 20, 2026
@github-actions
Copy link

PR Preview Action v1.8.1

QR code for preview link

🚀 View preview at
https://estuary.github.io/flow/pr-preview/pr-2624/

Built to branch gh-pages at 2026-01-20 16:55 UTC.
Preview will be ready when the GitHub Pages deployment is complete.

We recommend using our [SQL Server CDC Connector](http://go.estuary.dev/source-sqlserver)
instead when possible. CDC provides lower latency data capture, delete and
update events, and typically has a smaller impact on the source database.
Estuary offers three SQL Server capture connectors. All work across self-hosted
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We may want to phrase this as "three main SQL Server capture connectors and their variants" since someone searching the dashboard will find Azure, Amazon RDS, etc for SQL Server as well.

Relatedly, hopefully we're planning on updating the connector names to make it clear in the dashboard which options are CDC vs. CT.


Follow the [Self-hosted SQL Server](#self-hosted-sql-server) setup instructions above, with the following Azure-specific notes:

- **Firewall rules**: Configure [server-level IP firewall rules](https://learn.microsoft.com/en-us/azure/azure-sql/database/firewall-configure?view=azuresql#use-the-azure-portal-to-manage-server-level-ip-firewall-rules) to allow the [Estuary Flow IP addresses](/reference/allow-ip-addresses), or set up an SSH tunnel as described in the self-hosted instructions.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Note that we're standardizing Estuary Flow to Estuary (#2562).

configured when enabling Change Tracking. If the connector is offline for
longer than this retention period, or if it falls too far behind, it will
automatically perform a full backfill of impacted tables to re-establish
consistency.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we have a recommended minimum change tracking retention time?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

change:planned This is a planned change

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants