Using Remotes
What are Remotes?
Just like Git, Doltgres supports syncing with a remote database. A remote is a copy of your database that is distinct from your local copy. It usually is stored on a separate host or service for fault tolerance. The primary use cases are disaster recovery and collaboration. More conceptual description of remotes can be found here.
Configuring Remotes
Remotes are configured using the dolt_remote
procedure. You configure a remote with a name and a URL. When you want to use the remote, you refer to it by name. When you clone a remote, a remote named origin
is automatically configured for you.
Pushing to a Remote
Let's go through an example of how you can push data from a local Doltgres database to a remote. In this example, we'll use the running Doltgres server we created in the Getting Started section to push a branch a file-based remote.
First, we need to add a new remote:
And then we can push:
Now the data from our local Dolt server is now available for others to clone using the same URL.
Remote Actions
Sync functionality is supported via the clone
, fetch
, push
, and pull
procedures.
Remote Options
Filesystem
Filesystem based remotes allow you to push/pull data from any location that can be accessed via the filesystem. This may be a directory on your local disk, or any other storage location that can be mounted to the filesystem. To add a filesystem based remote use a URL with the file://
protocol.
Linux / OSX Examples
Adding a remote
Cloning
Windows Examples
Adding a remote
Cloning
It's important to note that a directory-based remote is not the same as a workspace for a dolt clone, and the directory listed above as a remote file URL is not a Doltgres database created or cloned with Doltgres. Similarly, a Doltgres database directory's file URL cannot be used as a remote directly.
AWS
AWS remotes use a combination of DynamoDB and S3. The Dynamo table can be created with any name but must have a primary key with the name "db".
This single DynamoDB table can be used for multiple unrelated remote repositories. Once you have a DynamoDB table, and an S3 bucket setup you can add an AWS remote using a URL with the protocol aws://
. To add a remote named "origin" to my "menus" repository using an S3 bucket named dolt_remotes_s3_storage
and a DynamoDB table named dolt_dynamo_table
you would run:
This same URL can then be used to clone this database by another user.
GCS
Google Cloud Platform remotes use Google Cloud Storage (GCS). You can create or use an existing GCS bucket to host one or more Doltgres remotes. To add a GCP remote provide a URL with the gs://
protocol like so:
In order to initialize Doltgres to use your GCP credentials you will need to install the gcloud
command line tool and run gcloud auth login
. See the Google document for details.
OCI
Oracle Cloud Infrastructure (OCI) remotes use Oracle Cloud Object Storage. You can create or use an existing OCI bucket to host one or more Doltgres remotes. To add an OCI remote provide a URL with the oci://
protocol like so:
In order to initialize Doltgres to use your OCI credentials you will need to install the oci
command line tool and run oci session authenticate
. See the Oracle document for details.
HTTP(s) Remotes
Doltgres supports remotes which use the protocol http://
and https://
. Remote servers must implement the GRPC methods defined by the ChunkStoreService interface.
Doltgres provides a sample remote server that we use for integration testing which could be deployed to serve your remotes as well, though you would want to extend the sample functionality to support things like auth. In our integration tests we install and run the remote server locally:
This starts a server listening on port 50051 for our grpc requests, and runs a file server on port 1234 which provides upload, and download functionality similar to S3 / GCS locally. We use the url http://localhost:50051/test-org/test-repo
when adding a remote or cloning from this remote server.
Doltgres sql-server
A running Doltgres can expose all the databases on it through an HTTP(s) remote endpoint. To configure this, you include a remotesapi:
configuration stanza inside the config.yaml
file given to sql-server
command. The stanza currently supports a single integer field, port:
, which defines the TCP port the remotesapi endpoint will be exposed on. Providing a port will cause the sql-server process to run a remotesapi endpoint on the provided port. The listening IP address is the same as for the SQL server itself. If the Postgres server itself is configured with a TLS key and certificate then the endpoint will use the same TLS configuration as the SQL server endpoint itself and it will require HTTPS.
Authenticating to the remotesapi exposed on a sql-server
works differently than authenticating to a typical HTTPS Dolt remote. Authentication to a sql-server remote is based on SQL users, passwords and grants, as opposed to the dolt creds
functionality which is used above in DoltHub and DoltLab remotes. The Dolt client's clone
, fetch
, pull
, and push
commands support a --user
parameter, which can be used to supply a username for authentication when interacting with the remote. The password to be used is supplied through an environment variable, DOLT_REMOTE_PASSWORD
, which should be set to the appropriate value when the clone
/fetch
/pull
/push
command is run. This username and password correspond to a configured SQL user on the sql-server.
Reading from sql-server
The clone
,fetch
, and pull
operations require the SQL user must have a grant for the CLONE_ADMIN
privilege on the server to which they are connecting. Here is an end-to-end example showing exposing the remotesapi on a running sql-server, granting a user permissions to a database on it, and then cloning that database from a Dolt client.
We configure the remotesapi to run on the sql-server
and run the sql-server process:
This configuration stanza causes the doltgres
server to open a remotesapi endpoint running on port 8080
. We can clone exampledb
from another server:
The --user
and DOLT_REMOTE_PASSWORD
settings are not stored in the local state of the remote configuration for the clone
. All future fetch
and pull
invocations from the clone directory need to supply them in order to authenticate to the remote.
Writing to sql-server
The push
operation require the SQL user must have super user privileges to push the the server.
Last updated