FivetranBest Practices

Fivetran Best Practices

This guide provides comprehensive best practices for implementing and managing Fivetran at scale. Follow these guidelines to optimize cost, reliability, security, and maintainability of your data pipe

24 min read

Fivetran Best Practices

This guide provides comprehensive best practices for implementing and managing Fivetran at scale. Follow these guidelines to optimize cost, reliability, security, and maintainability of your data pipelines.


Table of Contents

  1. Connector Setup & Configuration
  2. Schema Design & Management
  3. Cost Optimization
  4. Security & Compliance
  5. Performance Optimization
  6. Monitoring & Alerting
  7. Transformations with dbt
  8. Team Collaboration
  9. Disaster Recovery & Business Continuity
  10. Documentation & Maintenance

1. Connector Setup & Configuration

Choose the Right Sync Mode

Log-based CDC (Change Data Capture) - RECOMMENDED when available

Incremental Sync - Good for most use cases

Full Table Replication - Use sparingly

Configure Sync Frequency Appropriately

Best Practices:

  • Align sync frequency with business SLAs, not "as fast as possible"
  • Schedule syncs during source system off-peak hours
  • Use different frequencies for different connectors based on data criticality
  • Monitor and adjust based on actual usage patterns

Example: Salesforce Connector Configuration

Use SSH Tunnels for Database Security

Naming Conventions


2. Schema Design & Management

Understand Fivetran Schema Mapping

Leverage Fivetran System Columns

Every table includes these metadata columns:

Best Practices:

Handle Schema Drift Properly

Response Workflow:

  1. Receive schema change notification
  2. Review impact on downstream transformations
  3. Update dbt models if necessary
  4. Approve change in Fivetran dashboard
  5. Monitor initial sync after approval

Organize Warehouse Schemas


3. Cost Optimization

Understanding Monthly Active Rows (MAR)

Strategy 1: Exclude Unnecessary Data

Audit Checklist:

Strategy 2: Optimize Sync Frequency

Strategy 3: Use Incremental Sync Modes

Strategy 4: Consolidate Small Connectors

Strategy 5: Monitor MAR Usage

Create MAR Alerts:

Cost Estimation Formula


4. Security & Compliance

Principle of Least Privilege

Database Connectors:

Warehouse Destinations:

Network Security

Data Encryption

Handle PII/PHI Properly

Compliance Frameworks

SOC 2 Compliance

GDPR Compliance

HIPAA Compliance


5. Performance Optimization

Optimize Source Database Impact

Benefits:

  • Zero impact on production writes
  • No query contention with application
  • Can use replica with different resource allocation

Optimize Warehouse Performance

Sizing Guidelines:

Optimize Sync Timing

Partition Large Tables

When to partition:

  • Tables > 1GB
  • Time-series data
  • Queries typically filter on date ranges

6. Monitoring & Alerting

Key Metrics to Monitor

Monitoring Queries

Fivetran Metadata Tables

Create a Monitoring Dashboard


7. Transformations with dbt

Fivetran + dbt Integration

Use Fivetran dbt Packages

dbt Source Configuration

Incremental Models Using Fivetran Metadata

Best Practices for dbt with Fivetran


8. Team Collaboration

Role-Based Access Control

Change Management Process

Documentation Standards


9. Disaster Recovery & Business Continuity

Backup Strategy

Disaster Recovery Plan

Multi-Region Redundancy


10. Documentation & Maintenance

Quarterly Maintenance Checklist

Version Control for Configurations


Summary: The Fivetran Excellence Framework


Next Steps

  1. Assess Current State: Audit your existing Fivetran setup against this guide
  2. Prioritize Improvements: Focus on security and cost first
  3. Implement Incrementally: Don't try to do everything at once
  4. Measure Impact: Track before/after metrics (cost, reliability, performance)
  5. Iterate: Revisit quarterly and refine your approach

Need help implementing these best practices? Contact me for consulting on Fivetran optimization, cost reduction, and architectural review.

Stay in the loop

Get weekly insights on data engineering, analytics, and AI—delivered straight to your inbox.

No spam. Unsubscribe anytime.