Following are the options specific to Splice Machine:
Connection Name: Enter a unique Connection Name. This fields accepts letters, numbers, and symbols.
Hostname: Enter the Hostname of the Splice Machine database or select from the list of available IPs. You can also search for the hostnames and IP addresses of databases by Find DBMS.
Group/IP Range: Select the Group/IP range from the drop-down. For details on how to create and assign an IP range, please refer to the PK Protect Installation Guide.
Port Number: Enter the Port Number for establishing a connection. You can also edit the port number later, if required.
Database Name: Enter the name of the database.
Authentication Method: There are two authentication methods for Splice Machine databases as follows:
Native: Provide the following details to authenticate:
Username: Enter the database username.
Password: Enter the database password.
Kerberos with Principal: If Splice machine has been installed with Kerberos, provide the following details of the Kerberos setup to authenticate:
Principal Name: Enter the principal name.
Password: Enter the password.
Use Connection String: It specifies the information about the data source and the means of connecting to it. Check the Use Connection String checkbox and provide the connection string. Use this option if you want to authenticate the connection using a connection string instead of through username and password.
Connection Attribute: Select the attribute name from the Connection Attribute drop-down. This functionality allows you to add tags to the created connection.
Databases/Schemas: Enter the name of the database in the Filter By Schema/DB Name text box. Check the Include System Schema/DB Name checkbox to include the required schemas and databases and click Fetch Metadata. It will list down the available databases/schemas for the connection.
Check the databases/schemas name that you want to add as the target databases/schemas. The checked databases or schemas will appear in the Target Databases/Schemas panel.
To proceed further for remaining steps, refer Step 2 in RDBMS Detection Connection.