Install database drivers
After you've downloaded and installed Splunk DB Connect, the first step in the DB Connect setup process is installing a Java Database Connectivity (JDBC) database driver.
The recommended way to install a JDBC driver on a Splunk instance is to install a JDBC driver add-on. After you add the database driver, continue with either the single server or distributed deployment instructions. You will be able to verify whether the database driver was installed successfully during DB Connect setup.Install new drivers using JDBC Driver add-ons
DB Connect officially supports connecting to databases using JDBC drivers made available through the following Splunk add-ons for DB Connect using specific databases:
To use a JDBC driver from one of the add-ons simply install the add-on following installation instructions and DB Connect will automatically use the JDBC driver provided by the add-on.
If not already installed, you can install JDBC Add-ons directly from the DB Connect application during connection setup. In that case, a pop-up window will appear and you will need to follow the installation instructions. After the driver is installed, it takes approximately 10 seconds for it to be available on the system.
For all supported databases by drivers add-ons, to install the JDBC driver on a Splunk instance, follow these instructions:- Install the JDBC driver add-on for your database, if available.
- Reload the driver under Settings>Drivers.
$SPLUNK_HOME/etc/apps/splunk_app_db_connect/drivers
directory and a JDBC driver add-on. In such a case the JDBC driver provided by the add-on will take priority over the one in $SPLUNK_HOME/etc/apps/splunk_app_db_connect/drivers
directoryJAVA_HOME
must match the JRE version of the driver that you are installing.Upgrading add-on from manual install method
The recommended way to install a JDBC driver on a Splunk instance is to install a JDBC driver add-on. Drivers installed manually can be upgraded to add-on based drivers by using the following procedure:
- Remove appropriate manually installed JDBC driver from directory
$SPLUNK_HOME/etc/apps/splunk_app_db_connect/drivers
- Reload the driver under Settings>Drivers. Check if driver was deactivated in drivers list
- Install the appropriate JDBC driver from this manual: Install new drivers using DBX Driver add-ons.
Install unsupported drivers (customer managed only)
In addition to the supported databases that Splunk has tested and certified for use with DB Connect, you may also be able to use unsupported JDBC-compatible databases with Splunk DB Connect. You will need to provide the necessary JDBC drivers to add your own database types. You can add custom support to Splunk DB Connect for any database that has a JDBC driver, even if it doesn't appear in the supported database matrix.
Notes:
- Connecting to a database that is not listed in the supported database matrix is not supported by Splunk Support.
- At a minimum, Splunk DB Connect supports querying custom database connections. For some custom database connections, certain query-related features may not work.
Installing a custom database is a multi-step process:
Download and install the JDBC driver file
Download the JDBC driver for the database you want to add, and copy the .JAR file to the $SPLUNK_HOME/etc/apps/splunk_app_db_connect/drivers
directory (%SPLUNK_HOME%\etc\apps\splunk_app_db_connect\drivers
on Windows hosts).
Add the custom database to db_connection_types.conf
When you add a custom database connection that Splunk DB Connect does not support by default, you must create a stanza to define the database connection in a copy of db_connection_types.conf under $SPLUNK_HOME/etc/apps/splunk_app_db_connect/local
(%SPLUNK_HOME%\etc\apps\splunk_app_db_connect\local
on Windows hosts), for example
displayName = $your database name$
serviceClass = com.splunk.dbx2.DefaultDBX2JDBC
jdbcDriverClass = $JDBC driver class$
jdbcUrlFormat = $JDBC URI Format$
ui_default_catalog = $database$
For more information, see Configuration file reference.
Database connection validation
Each time DB Connect uses a database connection, it tries to validate that the database connection is actually working. If validation fails, you might see an error message, such as "ValidateObject failed".
DB Connect uses these two methods to validate a connection:
- If a testQuery is specified in db_connection_types.conf, DB Connect executes that query, and receives a response that validates that the connection is working.
- If testQuery is not specified, DB Connect uses the Java method connection.isValid(), and relies on the JDBC driver to answer. Some JDBC drivers do not implement this API call. (For instance, Apache Derby was built against Java 1.5, where JDBC doesn't have the method isValid.) The workaround is to specify a manual testQuery, such as
SELECT 1
.
After you add the custom database driver, continue with either the single server or distributed deployment instructions.
Enable SSL for your database connection
DB Connect has built-in support for connecting via SSL to several supported databases. Though other supported databases may support SSL connections, DB Connect support for SSL means that Splunk has tested SSL for that database type and supports connecting over SSL using DB Connect.
If you want to deploy DB Connect in Splunk Cloud. You must enable SSL connection for your database. See supported database matrix for the database supported for cloud deployment.
DB Connect will detect whether it supports SSL for your database type,
- If DB Connect supports SSL connections for your database type, enabling an SSL connection is easy. When you create a new database connection, select the Enable SSL checkbox.
- If DB Connect does not natively support SSL for your database type, you cannot select the Enable SSL checkbox in connection settings, it is grey out. However, you can add in SSL support by selecting Edit JDBC URL and editing the URL. Be aware that Splunk cannot certify that databases for which DB Connect does not have native support for SSL will connect via SSL correctly. Splunk Support will not help you troubleshoot such connections.
The possibility to configure one-way SSL authentication from the UI was added for MySQL, MSSQL and Oracle databases. While creating a connection users will be able to pass a certificate which will be automatically added to the Java TrustStore and used for the server authentication. If the Enable SSL checkbox will be selected, but the certificate field would be empty - DB Connect will ignore it and work as before.
To improve security following some properties have been removed from the default connection properties. The full list of changes can be found below.
- MySQL -
{"verifyServerCertificate":"false"}
- MS-SQL Server Using MS Generic Driver -
{"trustServerCertificate":"true"}
- MS-SQL Server Using MS Generic Driver With Windows Authentication -
{"trustServerCertificate":"true"}
- MS-SQL Server Using MS Generic Driver With Kerberos Authentication -
{"trustServerCertificate":"true"}
- Oracle -
{"oracle.net.authentication_services":"(TCPS)","oracle.net.ssl_cipher_suites":"(SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA)"}
- Oracle Service -
{"oracle.net.authentication_services":"(TCPS)","oracle.net.ssl_cipher_suites":"(SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA)"}
- PostgreSQL -
{"sslfactory":"org.postgresql.ssl.NonValidatingFactory"}
- AWS RedShift -
{"verifyServerCertificate":"false"}
- AWS RedShift version 2.0 -
{"verifyServerCertificate":"false"}
- AWS RDS Aurora -
{"verifyServerCertificate":"false"}
- Hive -
{"verifyServerCertificate":"false"}
- Spark SQL -
{"verifyServerCertificate":"false"}
If you still want to use them, they can be added to connection_properties in the connection definition, or defined in the jdbcUrl.
Use a different default driver for your database
You can change the driver that DB Connect uses for your database type. This can be useful if you want to use a custom driver to connect to your database. To change the driver, you edit the db_connection_types.conf
file.
First, get the JDBC driver vendor's Java driver class name. For example, the class name of the Microsoft JDBC Driver for SQL Server is com.microsoft.sqlserver.jdbc.SQLServerDriver. Once you've found the correct Java class name, do the following:
- Using a text editor, open the db_connection_types.conf from within
$SPLUNK_HOME/etc/apps/splunk_app_db_connect/default/
(%SPLUNK_HOME%\etc\apps\splunk_app_db_connect\default
on Windows hosts). - Find the stanza for the database type for which you want to configure a custom driver, select it, and then type Ctrl-C or Command-C to copy it.
- Create a new db_connection_types.conf file (if one doesn't already exist) in
$SPLUNK_HOME/etc/apps/splunk_app_db_connect/local/
(%SPLUNK_HOME%\etc\apps\splunk_app_db_connect\local
on Windows hosts). If the file is a new file, open it and type[local]
and then two new lines. - Paste in the database stanza you copied from the default db_connection_types.conf file.
- Change the entry next to
jdbcDriverClass
to match the Java class name for your custom driver. - If you want to retain the ability to choose the original database driver, change the name of the stanza and update the
displayName
attribute to differentiate it from the original driver. - Restart Splunk Enterprise.
Supported databases
Splunk DB Connect supports the databases listed in the following matrix.
- The driver listed in the JDBC driver name/link column is the driver that Splunk has tested with Splunk DB Connect.
- DB Connect supports and has been tested with Java cryptography standard algorithm, if you need a stronger algorithm, you must install the "JCE Unlimited Strength Jurisdiction Policy Files." Legal restrictions may apply in your country. See Java Security Providers and JCE Download pages for details. Consult your database vendor's documentation for configuration instructions.
Supported databases by JDBC Add-Ons
JDBC driver Add-Ons provides in documentation what version of java and database supports.
Other Supported Databases
Database | Database version | JDBC driver name | JDBC driver version tested | SSL support* | Cloud support** |
---|---|---|---|---|---|
AWS RedShift | 1.0.1044 |
RedshiftJDBC41-1.2.1.1001.jar
Note: Not compatible with RedshiftJDBC42-1.2.1.1001.jar.
|
1.1 | Yes | No |
Informix | 12.10.FC5TL | Informix JDBC Driver | 3.0 | Yes | No |
SAP SQL Anywhere (aka Sybase SA) | 16.0.0.1948 | Sybase jConnect | 7.0 | No | No |
Sybase ASE | 16.0.02.00.1014 | Sybase jConnect | 7.0 | No | No |
Sybase IQ | 15.4.1.3019 | Sybase jConnect | 7.0 | No | No |
Hive | 3.2.4 | Cloudera JDBC Driver | 2.6.5
2.6.13 |
No | No |
Google BigQuery | ODBC and JDBC drivers for BigQuery | 1.5.4.1008 | Yes |
* SSL support: This column specifies whether DB Connect tests and supports Secure Sockets Layer (SSL) connections to this database. Though other supported databases may support SSL connections, DB Connect support for SSL means that Splunk has tested SSL for that database type and supports connecting over SSL using DB Connect.
** Cloud support: This column specifies whether the database is supported for Splunk Cloud. You must enable SSL connection if you want to use DB Connect in a Splunk Cloud deployment.Useful information about drivers configuration
Notes:
- Your database connection must be set up to return results encoded in UTF-8. Consult your database vendor's documentation for instructions.
- DB Connect supports sending data that is in a multi-byte character set, such as Traditional Chinese, using a database output. Depending on your database, you may need to change certain settings on the database side to the database to properly receive and store the data. See Enable output to multi-byte character sets.
IBM DB2
IBM DB2 is supported when the database is running on Linux. Splunk doesn't test or support DB2 on AS/400 or Windows.
Note: IBM DB2 is only supported when the database is running on Linux. Splunk doesn't test or support DB Connect with DB2 on AS/400 or on Windows.
If you want to use GSS API security mechanisms in IBM DB2, download Java Cryptography Extension (JCE) Policy to your$JRE_Installation_Path/jre/lib/security
and set the encryptionAlgorithm parameter of JDBC URL as
jdbcUrlFormat = jdbc:db2://<host>:<port>/<database>:securityMechanism=9;encryptionAlgorithm=2;
Follow these instructions to install the DB2 JDBC Driver:
- Go to DB2 JDBC Driver Versions and Downloads on the IBM website, and click the link for the latest DB2 Version 10.5 driver.
- Click the Download link for the IBM Data Server Driver for JDBC and SQLJ (JCC Driver).
- Select the newest fix pack, and then click Continue. You will need to log in with your IBM ID, or create one if you don't already have one.
- Click the Download using your browser (HTTPS) radio button, and then Continue.
- Right-click the file name, and then save it to your hard disk.
- Expand the downloaded file, and then expand the db2_db2driver_for_jdbc_sqlj.zip file.
- Copy or move the db2jcc4.jar file to the
$SPLUNK_HOME/etc/apps/splunk_app_db_connect/drivers
directory. - Reload the driver under Settings>Drivers.
For additional information, see the Installing and Connecting to Clients documentation on the IBM website.
Hive
We support connecting to Hive using two database drivers: Simba and Cloudera
- For Simba, the procedure involves requesting a trial or purchasing the driver. After obtaining the license, it will be sent to you, and you'll need to follow attached instructions to activate it.
Microsoft SQL Server
You have several options for connecting to a Microsoft SQL Server. Start by determining:
- Which operating system (Windows or Linux) is running Splunk DB Connect.
- Which driver you want to use.
- How your database server authenticates your connection.
See Legends below the table for a more detailed explanation.
Follow this table from left to right, choosing the options that correspond to your Microsoft SQL Server environment. For more information about the meaning of each column, see the legend that follows the table.
Operating System* | Driver** | Authentication*** | How to configure the connection |
---|---|---|---|
Windows | Splunk DBX Add-on for Microsoft SQL Server JDBC | SQL Authentication | Configure SQL Server connection using SQL server authentication |
Windows Authentication | Configure SQL Server connection using Windows authentication | ||
Microsoft Entra ID Authentication | Configure Azure SQL Database connection using Microsoft Entra ID Authentication | ||
Linux | Splunk DBX Add-on for Microsoft SQL Server JDBC | SQL authentication | Configure SQL Server connection using SQL server authentication |
Kerberos authentication | Configure SQL Server connection using Kerberos authentication | ||
Microsoft Entra ID Authentication | Configure Azure SQL Database connection using Microsoft Entra ID Authentication |
Legend
* Operating System: The operating system on which DB Connect is running. DB Connect is supported on both Linux and Windows Server.
- Splunk DBX Add-on for Microsoft SQL Server JDBC: it uses Microsoft JDBC Driver for SQL Server together with Microsoft Authentication Library for Java (MSAL4J).
*** Authentication: The type of service account that DB Connect will use to connect to your database:
- SQL Authentication: Log into SQL Server as a SQL Server user. This option assumes you will create an identity that uses a username and password that is defined on the database.
- Windows Authentication: Log into SQL Server as a Microsoft Integrated Windows Authentication user ("domain user"). This assumes that you are creating an identity that uses a domain, user name, and password to connect to the database, and that the user you assign to the identity is part of an Active Directory user group that has been set up to log into your SQL Server.
- Kerberos Authentication: DB Connect uses a Kerberos client (Linux) to negotiate an authentication ticket with the Active Directory environment directly. This assumes that the user you assign to the identity is part of an Active Directory user group that has been set up to log into your SQL Server.
Install the SQL Server database driver using a SQL server authentication
If you will log onto your SQL Server database using a SQL Server username and password (non-domain attached), follow these instructions:
Install the SQL server database driver
To install the Microsoft JDBC Driver for SQL Server, please follow these instructions:
- Install the MSSQL JDBC driver add-on.
- Reload the driver under Settings>Drivers.
- Download the appropriate JDBC driver for SQL Server:
- For the Microsoft JDBC Driver for SQL Server download the driver from the Microsoft JDBC Driver page.
- Move the driver file to the correct location:
- For the MS Generic Driver, from inside the zip file, copy or move the proper jar file to the
$SPLUNK_HOME/etc/apps/splunk_app_db_connect/drivers
directory (%SPLUNK_HOME%\etc\apps\splunk_app_db_connect\drivers
on Windows hosts). - If you will need to use a database service account on Windows with the Generic driver, you will also need to install the JDBC Auth library:
- From the Microsoft JDBC Driver for SQL Server download, locate the .dll file.
- Copy the .dll' file to C:\Windows\System32 on your Splunk Enterprise server.
- From the Windows Control Panel, go to Services, and then get properties on Splunk Service.
- Click the Log On tab, and then change the Log on as setting from the Local System account to that of the logged on domain user.
Note: The domain user should have sufficient privileges to access the SQL Server instance.
- Save your changes, and then restart the Splunk Enterprise server for the changes to take effect.
- For the MS Generic Driver, from inside the zip file, copy or move the proper jar file to the
When you create a connection to this database in DB Connect, you must choose MS-SQL Server Using MS Generic Driver from the Connection Types popup menu.
Install the SQL Server database driver using the MS Generic driver with Kerberos authentication
If you're running DB Connect on Linux, you can connect to a Microsoft SQL Server using a Windows domain and user name by enabling Kerberos authentication.
Before starting the following procedure:
- See the instructions on how to Install the appropriate JDBC driver for SQL Server
- Enable Kerberos on the Microsoft SQL Server. [/topic/topic/body/section/ol/p {""}) Now complete the following steps to enable DB Connect to use Kerberos authentication to connect to your SQL Server database: (p] [/topic/topic/body/section/ol/ol {""}) [/topic/topic/body/section/ol/ol/li {""}) First, get the domain name: [/topic/topic/body/section/ol/ol/li/ol {""}) [/topic/topic/body/section/ol/ol/li/ol/li {""}) Log onto the Windows server that is running your SQL Server database. (li][/topic/topic/body/section/ol/ol/li/ol/li {""}) At the command line, run [/topic/topic/body/section/ol/ol/li/ol/li/codeph {""}) systeminfo (codeph], and then copy down the domain name (next to the [/topic/topic/body/section/ol/ol/li/ol/li/b {""}) Domain: (b] label). (li] (ol] (li] [/topic/topic/body/section/ol/ol/li {""}) Next, get the Kerberos Distribution Center (KDC) information: [/topic/topic/body/section/ol/ol/li/ol {""}) [/topic/topic/body/section/ol/ol/li/ol/li {""}) From the command line, run the following, replacing [/topic/topic/body/section/ol/ol/li/ol/li/codeph {""}) <domain> (codeph] with the domain name you copied in the previous step: [/topic/topic/body/section/ol/ol/li/ol/li/codeblock {""}) nltest /DSGETDC:<domain> (codeblock] (li][/topic/topic/body/section/ol/ol/li/ol/li {""}) Copy down the name of the domain controller, which is next to the [/topic/topic/body/section/ol/ol/li/ol/li/b {""}) DC: (b] label. This is the KDC host name. (li] (ol] (li] [/topic/topic/body/section/ol/ol/li {""}) Back on the machine running DB Connect, use the [/topic/topic/body/section/ol/ol/li/codeph {""}) kinit (codeph] command to generate a [/topic/topic/body/section/ol/ol/li/b {""}) krb5.conf (b] file, which Kerberos will use to authenticate with the SQL Server for DB Connect. [/topic/topic/body/section/ol/ol/li/ol {""}) [/topic/topic/body/section/ol/ol/li/ol/li {""}) First, install [/topic/topic/body/section/ol/ol/li/ol/li/codeph {""}) kinit (codeph] by entering the following at the command line: [/topic/topic/body/section/ol/ol/li/ol/li/codeblock {""}) apt-get install krb5-user (codeblock] If you are prompted to enter a realm, enter the domain name you obtained in Step 1, but in all upper-case letters. For example, if your domain is [/topic/topic/body/section/ol/ol/li/ol/li/codeph {""}) abc.dbx (codeph], you'd enter [/topic/topic/body/section/ol/ol/li/ol/li/codeph {""}) ABC.DBX (codeph]. (li][/topic/topic/body/section/ol/ol/li/ol/li {""}) Next, use [/topic/topic/body/section/ol/ol/li/ol/li/codeph {""}) kinit (codeph] to initialize the Kerberos ticket cache. Enter the following at the command line, replacing [/topic/topic/body/section/ol/ol/li/ol/li/codeph {""}) <username> (codeph] with the appropriate user name (such as [/topic/topic/body/section/ol/ol/li/ol/li/codeph {""}) Administrator (codeph]) and [/topic/topic/body/section/ol/ol/li/ol/li/codeph {""}) <DOMAIN> (codeph] with the domain name, in upper-case letters: [/topic/topic/body/section/ol/ol/li/ol/li/codeblock {""}) kinit <username>@<DOMAIN> (codeblock] [/topic/topic/body/section/ol/ol/li/ol/li/p {""}) The [/topic/topic/body/section/ol/ol/li/ol/li/p/b {""}) krb5.conf (b] has been generated in the [/topic/topic/body/section/ol/ol/li/ol/li/p/b {""}) /etc (b] directory. (p] [/topic/topic/body/section/ol/ol/li/ol/li/p {""}) [/topic/topic/body/section/ol/ol/li/ol/li/p/b {""}) Note: (b] If the [/topic/topic/body/section/ol/ol/li/ol/li/p/b {""}) krb5.conf (b] file is not in the [/topic/topic/body/section/ol/ol/li/ol/li/p/b {""}) /etc (b] directory, set the following option in [/topic/topic/body/section/ol/ol/li/ol/li/p/b {""}) JVM Options (b] under the [/topic/topic/body/section/ol/ol/li/ol/li/p/b {""}) Settings (b] tab: [/topic/topic/body/section/ol/ol/li/ol/li/p/codeph {""}) -Djava.security.krb5.conf=/path/to/krb5.conf (codeph] (p] (li] (ol] (li] [/topic/topic/body/section/ol/ol/li {""}) Create an identity in DB Connect. [/topic/topic/body/section/ol/ol/li/ol {""}) [/topic/topic/body/section/ol/ol/li/ol/li {""}) Select [/topic/topic/body/section/ol/ol/li/ol/li/b {""}) New Identity (b] under [/topic/topic/body/section/ol/ol/li/ol/li/b {""}) Explorer (b] > [/topic/topic/body/section/ol/ol/li/ol/li/b {""}) Identities (b]. (li][/topic/topic/body/section/ol/ol/li/ol/li {""}) Enter [/topic/topic/body/section/ol/ol/li/ol/li/b {""}) Identity Name (b], [/topic/topic/body/section/ol/ol/li/ol/li/b {""}) Username (b], [/topic/topic/body/section/ol/ol/li/ol/li/b {""}) Password (b], and then click [/topic/topic/body/section/ol/ol/li/ol/li/b {""}) save (b].[/topic/topic/body/section/ol/ol/li/ol/li/div {""}) (div] [/topic/topic/body/section/ol/ol/li/ol/li/ul {""}) [/topic/topic/body/section/ol/ol/li/ol/li/ul/li {""}) [/topic/topic/body/section/ol/ol/li/ol/li/ul/li/b {""}) Username (b]: Enter the username of your Kerberos account. If you don't select [/topic/topic/body/section/ol/ol/li/ol/li/ul/li/b {""}) Use Windows Authentication Domain? (b], you have to append @<DOMAIN> at the end of the username, e.g. Administrator@<DOMAIN> (li][/topic/topic/body/section/ol/ol/li/ol/li/ul/li {""}) [/topic/topic/body/section/ol/ol/li/ol/li/ul/li/b {""}) Password (b] and [/topic/topic/body/section/ol/ol/li/ol/li/ul/li/b {""}) Confirm Password (b]: Enter the password of your Kerberos account. (li][/topic/topic/body/section/ol/ol/li/ol/li/ul/li {""}) [/topic/topic/body/section/ol/ol/li/ol/li/ul/li/b {""}) Use Windows Authentication Domain? (b]: If you select it, you have to enter the <DOMAIN> in [/topic/topic/body/section/ol/ol/li/ol/li/ul/li/b {""}) Windows Authentication Domain (b] field, then you don't have to append @<DOMAIN> at the end of the [/topic/topic/body/section/ol/ol/li/ol/li/ul/li/b {""}) Username (b].[/topic/topic/body/section/ol/ol/li/ol/li/ul/li/div {""}) (div] (li] (ul] [/topic/topic/body/section/ol/ol/li/ol/li/b {""}) Note: (b] You can add multiple identities if you need to use the different users to do the Kerberos authentication. (li] (ol] (li] [/topic/topic/body/section/ol/ol/li {""}) Create a new connection in DB Connect as you normally would, keeping in mind the following: [/topic/topic/body/section/ol/ol/li/ul {""}) [/topic/topic/body/section/ol/ol/li/ul/li {""}) [/topic/topic/body/section/ol/ol/li/ul/li/b {""}) Database Types: (b] Be sure to choose [/topic/topic/body/section/ol/ol/li/ul/li/b {""}) MS-SQL Server Using MS Generic Driver with Kerberos Authentication (b] from the popup menu. (li][/topic/topic/body/section/ol/ol/li/ul/li {""}) [/topic/topic/body/section/ol/ol/li/ul/li/b {""}) JDBC URL Format: (b] Once you've entered all the necessary connection information, add the following to the JDBC URL string to enable DB Connect to use the Kerberos authentication you just set up: [/topic/topic/body/section/ol/ol/li/ul/li/ul {""}) [/topic/topic/body/section/ol/ol/li/ul/li/ul/li {""}) [/topic/topic/body/section/ol/ol/li/ul/li/ul/li/codeph {""}) integratedSecurity=true (codeph] (li][/topic/topic/body/section/ol/ol/li/ul/li/ul/li {""}) [/topic/topic/body/section/ol/ol/li/ul/li/ul/li/codeph {""}) authenticationScheme=javaKerberos (codeph] (li] (ul] (li] (ul] [/topic/topic/body/section/ol/ol/li/p {""}) After you're finished, the field should contain the following: (p] [/topic/topic/body/section/ol/ol/li/codeblock {""}) jdbc:sqlserver://<host>:<port>;databaseName=<database>;selectMethod=cursor;integratedSecurity=true;authenticationScheme=javaKerberos (codeblock] (li] (ol]