PostgreSQL is the primary database source in MantrixFlow. Use it to read from production, staging, or analytics databases and replicate data to any PostgreSQL-compatible destination.Documentation Index
Fetch the complete documentation index at: https://docs.mantrixflow.com/llms.txt
Use this file to discover all available pages before exploring further.
Connection fields
| Field | Default | Description |
|---|---|---|
| Connection Name | — | Friendly label shown in the builder |
| Host | — | Database hostname or IP address |
| Port | 5432 | PostgreSQL port |
| Database | — | Database name |
| Username | — | Database user |
| Password | — | Database password |
| Schema | public | Schema to discover tables from |
| SSL Mode | require | disable, require, verify-ca, verify-full |
Network access
MantrixFlow connects to the source database from the ELT server. The database must accept inbound connections from MantrixFlow’s static IP on port5432.
Supported network configurations:
- Public endpoint with provider firewall or IP allowlist
- Public endpoint with no provider allowlist (credentials must be strong)
- Private subnet / VPC-only databases without a public IP
- VPN-only access
- Bastion host or jump server connections
Provider setup
| Provider | What to configure |
|---|---|
| Neon | Use the direct connection string from the Neon Connect modal. If IP Allow is enabled, add MantrixFlow’s /32. See Neon IP Allow. |
| AWS RDS / Aurora PostgreSQL | Add an inbound security group rule for port 5432 from MantrixFlow’s /32. See AWS RDS security groups. |
| Supabase | Use the host from the Supabase dashboard. Add MantrixFlow’s /32 under Network Restrictions if enabled. See Supabase Network Restrictions. |
| GCP Cloud SQL for PostgreSQL | Enable public IP and add MantrixFlow’s /32 under Authorized networks. See Google authorized networks. |
| Azure Database for PostgreSQL | Use public access and create a firewall rule with start and end IP both equal to MantrixFlow’s IP. See Azure firewall rules. |
| Aiven for PostgreSQL | Add MantrixFlow’s /32 to the service IP filter. See Aiven access restrictions. |
| DigitalOcean Managed PostgreSQL | Add MantrixFlow’s IP as a trusted source on the database cluster. See DigitalOcean trusted sources. |
| Render Postgres | Use the external connection details and restrict access to MantrixFlow’s IP if you have access restrictions enabled. See Render Postgres networking. |
| Self-hosted | The server must have a public IP or be port-forwarded so MantrixFlow can reach it on port 5432. |
Permissions
Create a dedicated read-only user instead of using the database owner or an admin account.Step by step
Add MantrixFlow's IP to your firewall
Copy MantrixFlow’s static outbound IP from the connection form and add it as a
/32 rule in your provider’s firewall or allowlist.Add the source connection in MantrixFlow
Open Connections → + New Connection. Set the role to Source and choose PostgreSQL. Fill in all fields and click Test Connection. Save after the test passes.
Create a pipeline
Go to Data Pipelines → + New Pipeline, select this source connection, and follow the Postgres-to-Postgres guide.
SSL modes
| Mode | When to use |
|---|---|
disable | Local dev only. Never use in production. |
require | Use with most managed providers. Encrypts the connection. |
verify-ca | Verifies the server certificate against a trusted CA. |
verify-full | Verifies the server certificate and hostname. Strictest mode. |
Supported data types
All official PostgreSQL types are supported. Complex types (geometric, range, text search, composite, enum) are landed asTEXT for cross-provider compatibility.
See Data type compatibility for the full mapping table and cross-type widening rules.
Troubleshooting
| Symptom | Cause | Fix |
|---|---|---|
| Connection timeout | Provider firewall blocking MantrixFlow | Add MantrixFlow’s /32 to the provider allowlist |
| Authentication failed | Wrong credentials or database name | Re-check host, database, username, and password |
| No tables discovered | User missing USAGE on schema | Run GRANT USAGE ON SCHEMA |
| Table missing from discovery | User missing SELECT on that table | Run GRANT SELECT ON TABLE |
| TLS / SSL error | Provider requires stricter SSL mode | Change SSL mode to require, verify-ca, or verify-full |