Proxy Agent
To use this connection method, you need a Fivetran account on a Standard, Enterprise, or Business Critical plan.
The Fivetran Proxy Agent eliminates the need for other complex networking options. Installed within a customer's network, it creates an outbound network connection to the Fivetran Managed SaaS (see the list of IP addresses in our documentation). This allows for secure communication between Fivetran processes and your destination without opening an inbound port in your firewall and/or other access control systems. The Proxy Agent establishes and maintains an outbound gRPC connection to the Proxy Server in Fivetranās environment using mutual TLS (mTLS) over port 443. The Proxy Agent supports TLS up to and including version 1.3.
Proxy Agent versions prior to v1.1.0, bundled with High-Volume Agent version 6.1.0_79 and earlier, use WebSockets with TLS to communicate with the Fivetran Proxy Server.
The Proxy Agent is configured by a destination region, so it can only handle connections running within the same region. For example, if the Proxy Agent is in the us-east4 region, and both BigQuery and Snowflake are hosted there as data destinations, the Proxy Agent can work with both.
System requirements
Proxy Agent requires the following system resources:
- CPU: Minimum 4 vCPUs with x86-64 processors
- Memory: Minimum 5 GB of RAM
- Storage: Minimum 2 GB allocated disk space for the executables and logs
- Java: The Proxy Agent includes a bundled Java Runtime Environment (JRE) based on open-source Azul Zulu JDK. You do not need to install or purchase any additional Java licenses.
Supported destinations
You can use Proxy Agent with PostgreSQL and SQL Server destinations.

- A Proxy Agent can support multiple clients (connectors or destinations). However, we recommend that you use a maximum of 10 clients per Proxy Agent.
- A Proxy Agent can only be used for connections within a single Fivetran cloud processing region, but it can be used by any connection in your account that runs in that region. For example, a Proxy Agent configured for the
AZURE_EASTUS2region cannot be used by a connection that runs in theGCP_US_EAST4region. In that case, you must use a separate Proxy Agent that is configured for theGCP_US_EAST4region.
Configure Proxy Agent
Follow the instructions below to configure a destination through the Proxy Agent.
Proxy Agents configured after June 10, 2025 must use the Proxy Agent bundled with High-Volume Agent version 6.1.0/79 or later.
Certificate management options
The Proxy Agent uses a client certificate and private key to authenticate to Fivetran. You can manage these credentials using one of the following methods:
Embedded certificate method (default): Fivetran generates the client certificate and private key and embeds them directly inside the Proxy Agent configuration file (
config.json). This is the simplest and recommended method for most deployments.KeyStore method (advanced): You store the Fivetran-generated client certificate and private key in a secure PKCS12 KeyStore file. This method is available in Proxy Agent version 1.1.4 or later, which is bundled with High-Volume Agent version 6.1.0_90 and later.
Using a KeyStore provides the following benefits:
- Encrypted, password-protected storage for the certificate and private key
- Separation of configuration (
config.json) and sensitive credentials (certificate and private key)
Both methods require generating the Proxy Agent configuration file (config.json). If you plan to use the KeyStore method, you will extract the embedded certificate and private key from this file for use in your KeyStore. See Configure Proxy Agent to use KeyStore.
Generate Proxy Agent settings
Follow the instructions below to generate the Proxy Agent configuration file (config.json), which contains the settings and authentication parameters required to establish secure communication between the Proxy Agent and Fivetran. This file is also required to install the Proxy Agent.
In Fivetran's destination setup form, do the following:
In the Connection Method drop-down menu, select Connect via proxy agent.
Click Configure a new proxy agent.

Proceed to the Configure a new proxy agent dialog.
Download High-Volume Agent if you have not already. Then, select the I've downloaded the agent checkbox and click Next.

Enter a name for your Proxy Agent and click Generate proxy agent config to generate a Proxy Agent configuration file.

Download the generated Proxy Agent configuration file (
config.json) and save it in a location that is easy to access. You will need this file for the installation of the Proxy Agent.The configuration file contains the settings and authentication parameters required to establish secure communication between the Proxy Agent and Fivetran.

Select the I have downloaded the file checkbox and click Save to finalize the Proxy Agent configuration.
(Optional): If the Proxy Agent needs to forward traffic through an intermediate network proxy to reach Fivetran, add the following configuration to your
config.jsonfile:Do not include
http://orhttps://in the<proxy_host>value.proxy_host: "<proxy_host>", proxy_port: "<proxy_port>"
Configure Proxy Agent to use KeyStore (optional)
If you are using the KeyStore method for certificate management, follow the steps in this section.
Skip this step if you are using the default Embedded certificate method.
Configure the Proxy Agent to use a KeyStore
Prerequisites:
- Proxy Agent version 1.1.4 or later (bundled with High-Volume Agent version 6.1.0_90 and later).
- The operating system user that runs the Proxy Agent service must have read access to the KeyStore file.
- On Linux, the Proxy Agent service is started by
root, so the KeyStore file must be readable byroot. When generating the KeyStore, run theopensslcommand usingsudoto ensure the file is created with the correct ownership. - On Windows, the Proxy Agent service runs under the
LocalSystemaccount unless a different service user is selected during installation. Ensure that whichever account is used to run the service has read access to the KeyStore file.
- On Linux, the Proxy Agent service is started by
- OpenSSL version 1.0.1 or later installed (which is required to convert PEM files into a PKCS12 KeyStore).
Perform the following steps to prepare and configure the KeyStore:
Extract the certificate and private key from the generated
config.jsonfile into PEM files. Run the following commands in the directory where theconfig.jsonfile is located:Ensure you have
jqinstalled on your system. If not, follow the instructions in the jq installation guide.jq -r .client_cert < config.json > certificate.pem jq -r .client_private_key < config.json > private_key.pemConvert the PEM certificate and private key into a PKCS12 KeyStore file.
OpenSSL is required to convert the PEM certificate and private key into a PKCS12 KeyStore file. Ensure that OpenSSL version 1.0.1 or later is installed. Earlier versions do not support the SHA-256 algorithms required for PKCS12 keystores. If OpenSSL is not installed already, install it using either your operating systemās package manager or by downloading the source from the OpenSSL project website.
Linux:
sudo openssl pkcs12 -export \ -in certificate.pem \ -inkey private_key.pem \ -out keystore.p12 \ -name orchestrator.fivetran.com \ -passout pass:<your_secure_password>Windows:
openssl pkcs12 -export -in certificate.pem -inkey private_key.pem -out keystore.p12 -name orchestrator.fivetran.com -passout pass:<your_secure_password>
Set permissions on the KeyStore file so the Proxy Agent service can read it.
The KeyStore file must be readable by the operating system user that runs the Proxy Agent service.
Linux:
Since the Proxy Agent service is started byroot, creating the KeyStore file withsudo(as shown in the previous step) ensures thatrootcan read the file.Windows:
Set file permissions based on the account used to run the Proxy Agent service.Replace
<path_to_keystore>with the full path to your KeyStore file and<ServiceUserName>with the Windows account configured for the Proxy Agent service.LocalSystem account (default):
icacls <path_to_keystore> /grant:r "NT AUTHORITY\SYSTEM":R "BUILTIN\Administrators":F /CCustom service user:
icacls <path_to_keystore> /grant:r "<ServiceUserName>":R "BUILTIN\Administrators":F /C
(Optional) Validate that the KeyStore was created correctly using the JRE bundled with the Proxy Agent:
Linux:
$HVR_HOME/jre/bin/keytool -list -keystore keystore.p12 -storetype PKCS12 -storepass <your_secure_password>Windows:
%HVR_HOME%\jre\bin\keytool -list -keystore keystore.p12 -storetype PKCS12 -storepass <your_secure_password>Expected output:
Keystore type: PKCS12 Keystore provider: SUN Your keystore contains 1 entry orchestrator.fivetran.com, Jan 15, 2025, PrivateKeyEntry, Certificate fingerprint (SHA-256): AA:BB:CC:...
Remove the embedded certificate fields from your configuration file. This ensures that the Proxy Agent relies only on the KeyStore for the certificate and private key.
For Windows EXE installations, the installer requires embedded certificates for validation. Do not remove the
client_certandclient_private_keyfields before installation. Remove these fields after the installation completes, as described in Configure KeyStore settings for Windows EXE installation.Before (embedded certificates):
{ "agent_id": "your_agent_id", "auth_token": "...", "orchestrator_host": "orchestrator.fivetran.com", "client_cert": "-----BEGIN CERTIFICATE-----\n...\n-----END CERTIFICATE-----\n", "client_private_key": "-----BEGIN RSA PRIVATE KEY-----\n...\n-----END RSA PRIVATE KEY-----\n" }After (using KeyStore):
{ "agent_id": "your_agent_id", "auth_token": "...", "orchestrator_host": "orchestrator.fivetran.com" }
Network configuration and validation
Before installing the Proxy Agent, safelist the hostnames of the Proxy Broker and the appropriate Proxy Server in your firewall so that the Proxy Agent can connect to our server. After configuring your firewall, do the following to verify connectivity to Fivetran's Proxy Server on the machine on which the Proxy Agent will be installed.
Verify Connectivity to the Proxy Broker
- Using Telnet:
telnet orchestrator.fivetran.com 443 - Using Netcat:
nc orchestrator.fivetran.com 443 -v
Verify Connectivity to the Proxy Server
Replace <proxy server hostname> with the hostname for the appropriate region:
- Using Telnet:
telnet primary.<proxy server hostname> 443 - Using Netcat:
nc primary.<proxy server hostname> 443 -v
Install Proxy Agent
Follow the Proxy Agent installation instructions for your operating system.
Install Proxy Agent on Windows using EXE file (Installer)
When installing the Proxy Agent as a service, the user who installs the Proxy Agent must have permission to manage Windows services. We recommend that you install the Proxy Agent as an Administrator user.
Run the downloaded
.exefile (e.g.fivetran-6.1.0_23-hub_and_agent-windows-x64-64bit_ga_patch-setup.exe).In the installation wizard dialog, click Next.

Read the License Agreement, select I accept the agreement and click Next.

Specify the installation directories and click Next.

Specify the name for the program folder and click Next.

Select the role of the installation:
Proxy Agent to install the Proxy Agent

Paste the Proxy Agent settings from the configuration file (
config.json) you've generated and click Next.The configuration file contains the settings and authentication parameters required to establish secure communication between the Proxy Agent and Fivetran.

Select the user account for running the Proxy Agent service.
If Specified user is selected, enter values for User, Password, Confirm Password and click Next.

If Local System account is selected, click Next.

Click Next to initiate the installation.

Click Finish to start the Proxy Agent. Once installed, the Proxy Agent service appears running in Windows Services.

(Optional) If you are using a KeyStore for certificate management, configure the Proxy Agent to load the KeyStore by setting the required JVM system properties.
Expand for instructions
Configure KeyStore settings for Windows EXE installation
The Windows EXE installer creates the Proxy Agent as a Windows service using
prunsrv.exe. The installer requires embedded certificates during installation for validation. After installation completes, you must remove the embedded certificates from the Proxy Agent configuration and then configure the service to load credentials from the KeyStore.Stop the Proxy Agent service:
net stop "Fivetran Proxy Agent"Remove the embedded certificate fields from the Proxy Agent configuration file.
a. Open the
%HVR_CONFIG%\proxy\proxyagent.conffile.b. Remove the
client_certandclient_private_keyfields.Before (embedded certificates):
{ "agent_id": "your_agent_id", "auth_token": "...", "orchestrator_host": "orchestrator.fivetran.com", "client_cert": "-----BEGIN CERTIFICATE-----\n...\n-----END CERTIFICATE-----\n", "client_private_key": "-----BEGIN RSA PRIVATE KEY-----\n...\n-----END RSA PRIVATE KEY-----\n" }After (using KeyStore):
{ "agent_id": "your_agent_id", "auth_token": "...", "orchestrator_host": "orchestrator.fivetran.com" }c. Save the file after removing the fields.
Identify the actual service name created by the installer:
sc query | findstr /i "FivetranProxy"Note the service name in the output. It has the format
FivetranProxyPrunsrv_<HASH>(for example,FivetranProxyPrunsrv_ABCD1234).Update the service to include the KeyStore JVM system properties:
"%HVR_HOME%\proxy\prunsrv.exe" //US//FivetranProxyPrunsrv_<HASH> ++JvmOptions "-Djavax.net.ssl.keyStore=<path_to_keystore>" ++JvmOptions "-Djavax.net.ssl.keyStorePassword=<your_secure_password>"Replace:
FivetranProxyPrunsrv_<HASH>with the service name you identified<path_to_keystore>with the full path to your KeyStore file<your_secure_password>with the KeyStore password
Using ++JvmOptions appends options without removing existing JVM configuration required by the Proxy Agent.
Start the Proxy Agent service:
net start "Fivetran Proxy Agent"Check the Proxy Agent logs to confirm that the KeyStore was loaded successfully. By default, the log file is located at
%HVR_CONFIG%\proxy\log\agent-out.log. Look for entries similar to:INFO: Certificates not found in config, attempting to load from KeyStore INFO: Using KeyStore from javax.net.ssl.keyStore: <path_to_keystore> INFO: Successfully loaded certificates from KeyStore for alias: orchestrator.fivetran.com
Install Proxy Agent on Windows using ZIP file
Perform the following steps in the user account that will be used for operating the Proxy Agent:
Configure the environment variables
HVR_HOME,HVR_CONFIG, andHVR_TMPfor your operating system using commandsetxorset. Each of these environment variables should be pointed to the installation directories -hvr_home,hvr_config, andhvr_tmp:Environment variables set using
setxcommand are available in the future command windows only and the environment variables set usingsetcommand are available in the current command window only.setx HVR_HOME C:\fivetran\hvr_home setx HVR_CONFIG C:\fivetran\hvr_config setx HVR_TMP C:\fivetran\hvr_tmpset HVR_HOME=C:\fivetran\hvr_home set HVR_CONFIG=C:\fivetran\hvr_config set HVR_TMP=C:\fivetran\hvr_tmpAlso, add the executable directory path (e.g
C:\fivetran\hvr_home\bin) to the environment variablePATH.setx PATH "%PATH%C:\fivetran\hvr_home\bin"set PATH=%PATH%;C:\fivetran\hvr_home\binAlternatively, environment variables can be configured using Windows GUI.
Navigate to Control Panel ā¶ System and Security ā¶ System ā¶ Advanced system settings
Alternatively, use the command
sysdm.cplto open System Properties.In the Advanced tab, click Environment Variables...

In section System variables or User Variables for user_name, click New.
Enter Variable name (e.g,
HVR_HOME) and Variable value (e.g,C:\fivetran\hvr_home).
Click OK.
Repeated the above steps for each environment variable.
Add the executable directory path to the environment variable
Path.In section System variables or User Variables for user_name, from the list of variables, select Path and click Edit....
Click New and enter the path for the Proxy Agent executable.

Click OK.
Create the installation directory -
hvr_home(e.g.C:\fivetran\hvr_home):md %HVR_HOME%- Other directories (
hvr_configandhvr_tmp) will be created automatically as needed. hvr_homeis regarded a read-only directory.
- Other directories (
Uncompress (unzip) the installation file (e.g. fivetran-6.1.0_23-hub_and_agent-windows-x64-64bit_ga_patch.zip) into the
hvr_homedirectory:cd %HVR_HOME% C:\fivetran\hvr_home>tar -xf C:\Users\Admin\Downloads\fivetran-6.1.0_23-hub_and_agent-windows-x64-64bit_ga_patch.zipAlternatively, files can be uncompressed using the 'Extract All' option in Windows GUI.

Paste the Proxy Agent settings from the configuration file (
config.json) you've generated in Step 6 to theproxyagent.conffile located in theHVR_CONFIG/proxydirectory.The configuration file contains the settings and authentication parameters required to establish secure communication between the Proxy Agent and Fivetran.
If the
proxyagent.conffile is missing, create the file manually.Run the following command to validate the Proxy Agent settings:
%HVR_HOME%/jre/bin/java -jar %HVR_HOME%/proxy/proxyagent.jar -v %HVR_CONFIG%/proxy/proxyagent.confCreate a
.batfile (e.g.install_and_run_proxy_service.bat) with the following contents.FOR /F "delims=" %%i IN ('CALL "%HVR_HOME%/bin/hvr" hvrhubserversvc -s') DO SET HvrHubServerSvcOutput=%%i REM We use a normalized HVR_CONFIG path hash to guarantee a unique service name SET HubConfigHash=%HvrHubServerSvcOutput:~13,8% REM In the CLI below use "DomainName\UserName" for --ServiceUser and specify --ServicePassword parameter if needed REM Adjust the other parameters as necessary REM Ensure to have unique service name (in //IS//<ServiceName>) and display name %HVR_HOME%/proxy/prunsrv.exe //IS//FivetranProxy_%HubConfigHash% ^ --StartParams "%HVR_CONFIG%/proxy/proxyagent.conf" ^ --ServiceUser "LocalSystem" ^ --DisplayName "Fivetran Proxy Agent [%HubConfigHash%]" ^ --Description "Fivetran Proxy Agent installed into %HVR_HOME%\proxy" ^ --Jvm "%HVR_HOME%/jre/bin/server/jvm.dll" ^ --JavaHome "%HVR_HOME%/jre" ^ --Classpath "%HVR_HOME%/proxy/proxyagent.jar" ^ --StartPath "%HVR_HOME%/proxy/" ^ --Startup=auto ^ --StartMode=jvm ^ --StartClass=com.fivetran.proxy.agent.ProxyAgent ^ --StartMethod=main ^ --StopMode=jvm ^ --StopClass=com.fivetran.proxy.agent.ProxyAgent ^ --StopMethod=stop ^ --JvmOptions "-XX:+HeapDumpOnOutOfMemoryError" ^ --StdOutput "%HVR_CONFIG%/proxy/logs/agent-out.log" ^ ++Environment "HVR_CONFIG=%HVR_CONFIG%" ^ ++Environment "HVR_HOME=%HVR_HOME%" ^ ++Environment "HVR_TMP=%HVR_TMP%" %HVR_HOME%/proxy/prunsrv.exe //ES//FivetranProxy_%HubConfigHash%Run the
.batfile to configure and start the Proxy Agent:install_and_run_proxy_service.bat(Optional) If you are using a KeyStore for certificate management, configure the Proxy Agent to load the KeyStore by setting the required JVM system properties.
Expand for instructions
Configure KeyStore settings for Windows ZIP installation (optional)
Stop the Proxy Agent service:
%HVR_HOME%\bin\hvrproxy.bat stopUpdate the Proxy Agent service definition to include the required JVM system properties for loading the KeyStore. Open the
install_and_run_proxy_service.batfile you created earlier and modify the--JvmOptionsline:--JvmOptions "-XX:+HeapDumpOnOutOfMemoryError; -Djavax.net.ssl.keyStore=<path_to_keystore>; -Djavax.net.ssl.keyStorePassword=<your_secure_password>"Rerun the updated install script to update the service definition:
install_and_run_proxy_service.batStart the Proxy Agent service:
%HVR_HOME%\bin\hvrproxy.bat startCheck the Proxy Agent logs to confirm that the KeyStore was loaded successfully. By default, the log file is located at
%HVR_CONFIG%\proxy\log\agent-out.log. If you have configured a custom log directory using thelog_folder_pathsetting inproxyagent.conf(located in%HVR_CONFIG%\proxy), the logs are written to that directory instead (for example,<log_folder_path>\agent-out.log). Look for entries similar to:INFO: Certificates not found in config, attempting to load from KeyStore INFO: Using KeyStore from javax.net.ssl.keyStore: <path_to_keystore> INFO: Successfully loaded certificates from KeyStore for alias: orchestrator.fivetran.com
Install Proxy Agent on Linux
Perform the following steps as the user that will be used for operating Proxy Agent:
The commands to set the environment variables depend on the shell you use to interface with the operating system. This procedure lists examples that can be used in Bourne Shell (sh) and KornShell (ksh).
Configure the environment variables
HVR_HOME,HVR_CONFIG, andHVR_TMPfor your operating system. Each of these environment variables should be pointed to the installation directories -hvr_home,hvr_config, andhvr_tmp.export HVR_HOME=/home/fivetran/hvr_home export HVR_CONFIG=/home/fivetran/hvr_config export HVR_TMP=/home/fivetran/hvr_tmpAlso, add the executable directory path to the environment variable
PATH.PATH=$PATH:$HVR_HOME/binAdd the environment and the executable directory path into the startup file (e.g.
.profile).export HVR_HOME=/home/fivetran/hvr_home export HVR_CONFIG=/home/fivetran/hvr_config export HVR_TMP=/home/fivetran/hvr_tmp export PATH=$PATH:$HVR_HOME/binCreate the installation directory -
hvr_homeusing the following commands:umask 022mkdir $HVR_HOMEumask 022is used so that the files and directories created in the following commands are readable by everyone (other Linux users and groups), but only writable by the owner. Other directories (HVR_CONFIGandHVR_TMP) will be created automatically as needed. TheHVR_HOMEdirectory is regarded as read-only.Uncompress the installation file (e.g.
fivetran-6.1.0_23-hub_and_agent-linux_glibc2.17-x64-64bit_ga.tar.gz) into theHVR_HOMEdirectory:cd $HVR_HOMEtar xzf /tmp/hvr-6.1.0_23-hub_and_agent-linux_glibc2.17-x64-64bit_ga.tar.gzOnce installed, the
jreandproxyfolders are created in yourHVR_HOMEdirectory.Create a new directory for the
proxyagent.conffile inhvr_config(/home/fivetran/hvr_config/proxy). Paste the Proxy Agent settings from the configuration file (config.json) you've generated to theproxyagent.conffile located in the newly created directory.The configuration file contains the settings and authentication parameters required to establish secure communication between the Proxy Agent and Fivetran.
Run the following command to verify if the Linux machine is ready for the setup. The output of the command should be
systemd.ps -p 1 -o comm=Update the
fivetran_proxy.servicefile in the/etc/systemd/systemdirectory with the correct path tojava.jar,proxyagent.jar, andproxyagent.conffiles.If missing, create the
fivetran_proxy.servicefile manually. The contents of the file should be as follows:[Unit] Description=Fivetran Proxy Agent #<agent_id> [Service] Type=simple Environment="HVR_HOME=/home/fivetran/hvr_home" Environment="HVR_CONFIG=/home/fivetran/hvr_config" Environment="HVR_TMP=/home/fivetran/hvr_tmp" ExecStart=${HVR_HOME}/jre/bin/java -XX:+HeapDumpOnOutOfMemoryError -XX:HeapDumpPath=${HVR_CONFIG}/proxy/ -jar ${HVR_HOME}/proxy/proxyagent.jar ${HVR_CONFIG}/proxy/proxyagent.conf # Restart this service to after a crash Restart=always # The number of seconds to wait before attempting a restart RestartSec=5s [Install] WantedBy=multi-user.targetExecute the following commands as the
rootuser to start the Proxy Agent service.a. Enable the service:
systemctl enable fivetran_proxy.serviceb. Start the service:
systemctl start fivetran_proxy.servicec. Verify the status of the service:
systemctl status fivetran_proxy.service(Optional) If you are using a KeyStore for certificate management, configure the Proxy Agent to load the KeyStore by setting the required JVM system properties.
Expand for instructions
Configure KeyStore settings for Linux installation (optional)
Update the
systemdservice definition to include the required JVM system properties for loading the KeyStore. Edit the/etc/systemd/system/fivetran_proxy.servicefile and add the following line under the[Service]section:Environment="JAVA_OPTS=-Djavax.net.ssl.keyStore=/path/to/keystore.p12 -Djavax.net.ssl.keyStorePassword=<your_secure_password>"Reload the
systemddaemon and restart the Proxy Agent service:sudo systemctl daemon-reload sudo systemctl restart fivetran_proxy.serviceCheck the Proxy Agent logs to confirm that the KeyStore was loaded successfully. By default, the log file is located at
%HVR_CONFIG%/proxy/log/agent-out.log. If you have configured a custom log directory using thelog_folder_pathsetting inproxyagent.conf(located in$HVR_CONFIG/proxy), the logs are written to that directory instead (for example,<log_folder_path>/agent-out.log). Look for entries similar to:INFO: Certificates not found in config, attempting to load from KeyStore INFO: Using KeyStore from javax.net.ssl.keyStore: <path_to_keystore> INFO: Successfully loaded certificates from KeyStore for alias: orchestrator. fivetran.com
Proxy Agent directory structure
The following directories are created during the installation of the Proxy Agent. Each directory may contain files and subdirectories:
hvr_home: Contains executables and files essential for running the Proxy Agent.Expand to see the directories and files in
hvr_homeš hvr_home ā āā š api -- REST API documentation ā āā š bin -- Executable files and shared libraries (dynamic-link ā libraries on Windows) for running the Proxy Agent ā āā š dbms -- Database-specific SQL files and templates ā āā š etc -- Configuration files and other miscellaneous files ā ā ā āā š cert -- Bundled certificates, such as root CAs ā ā ā āā š snmp -- SNMP MIB file ā ā ā āā š xml -- DTD of XML-serialized data streams ā ā ā āā š constsqlexpr.pat -- SQL expressions treated as constants to ā ā optimize replication performance ā ā ā āā š hvrosaccess_example.conf -- Sample configuration for allowing HVR to ā ā run plugins from non-standard directories ā ā ā āā š purge.manifest -- Manifest file (see hvrstrip -m) ā āā š examples -- Sample channel definitions ā āā š lib -- Shared libraries and database drivers ā āā š plugin -- Plugins shipped (installed) with the Proxy Agent ā ā ā āā š agent ā ā ā āā š transform ā āā š plugin_examples -- Sample plugins. To use a sample plugin, save ā ā it in the 'hvr_config/plugin' directory ā āā š agent ā ā ā āā š authentication ā ā ā āā š rewrite ā ā ā āā š transform ā āā š sbin -- Manually created trusted executables ā āā š script -- Internal Proxy Agent script files ā āā š www -- HVR UI-related files ā āā š hvr.3rdparty -- License agreements, copyrights, versions, and notices ā for third-party software used by the Proxy Agent ā āā š hvr.rel -- Proxy Agent Release Notes ā āā š hvr.ver -- Proxy Agent version numberhvr_config: Contains directories and files associated with the Proxy Agent configuration.Expand to see the directories and files in
hvr_configš hvr_config -- Directories and files for the Proxy Agent configuration ā āā š etc -- Configuration files for the Proxy Agent ā āā š intermediate -- Temporary files for Compare/Refresh jobs ā āā š logs -- Proxy Agent-level log files ā āā š plugin -- User-installed plugins (see 'hvr_home/plugin_examples/') ā ā ā āā š agent ā ā ā āā š transform ā āā š public -- Log file retention information ā āā š run -- Runtime state, such as `.pid` files ā āā š tmp -- Temporary files (default, if HVR_TMP is not defined)hvr_tmp(optional): Contains temporary files associated with the Proxy Agent.
Making any changes to the hvr_home directory or its subdirectories is strictly prohibited. This directory must remain unchanged to ensure security and integrity during updates or upgrades. User-specific configurations and runtime data is stored in the hvr_config directory.
(Recommended) Configure Proxy Agent recovery on Windows
Expand for instructions
If your Proxy Agent is installed on a Windows system, you can set up a recovery configuration for the agent by performing the following steps:
This process is not required on Linux systems.
Go to Control Panel > Administrative Tools > Computer Management > Services and Applications > Services or use the
services.msccommand to open the Services console.In the Services console, locate the Fivetran Proxy Agent service. Ensure the service description matches the installation directory.
Right-click the service and select Properties.
Go to the Recovery tab.
Set your preferred recovery options for the failure scenario.

The SC failure command-line utility is also available for more advanced configurations. This tool allows you to automate recovery actions directly through the command line.
Upgrade Proxy Agent
Steps for upgrading the Proxy Agent depend on how it was installed.
Before upgrading the Proxy Agent, we recommend making a copy of the Proxy Agent configuration file (hvr_config/proxy/proxyagent.conf) located on the Proxy Agent machine. Backing it up preserves the existing Proxy Agent configuration, including the certificates used to establish secure communication with Fivetran. This lets you quickly restore the configuration if you need to revert to an earlier Proxy Agent version after an upgrade or reinstall, without having to generate a new Proxy Agent configuration file.
Proxy Agent Installed on Windows using EXE file (Installer)
The Installer will automatically detect the existing Proxy Agent installation and upgrade it. Perform the following steps:
Download the latest High-Volume Agent Installer from the downloads page.
Run the Installer
Proxy Agent Installed on Windows using a ZIP file or on Linux (Installer)
The Proxy Agent installed using a ZIP file or on Linux requires manual upgrade steps. Perform the following steps:
Download the latest High-Volume Agent for the desired operating system from the downloads page.
Uninstall the existing proxy agent using the Uninstall Proxy Agent instructions.
Follow the instructions for installing the Proxy Agent using the appropriate section of the installation instructions.
Uninstall Proxy Agent
Follow the instructions below to uninstall the Proxy Agent.
If you are uninstalling the Proxy Agent to perform an upgrade, we recommend making a copy of the Proxy Agent configuration file (hvr_config/proxy/proxyagent.conf) located on the Proxy Agent machine. Backing it up preserves the existing Proxy Agent configuration, including the certificates used to establish secure communication with Fivetran. This lets you quickly restore the configuration if you need to revert to an earlier Proxy Agent version after an upgrade or reinstall, without having to generate a new Proxy Agent configuration file.
Uninstall Proxy Agent from Windows
The steps to uninstall the Proxy Agent depend on whether you used an EXE file (Installer) or a ZIP file to install it.
Ensure that no Windows Services management console applications (opened via services.msc) are running.
Uninstall Proxy Agent that was installed using an EXE file
Navigate to the
uninstallfolder in the Proxy Agent installation directory%HVR_HOME%(for example,C:\fivetran\hvr_home\uninstall).Double-click the
uninstall.exefile to initiate the uninstallation process.
Uninstall Proxy Agent that was installed using a ZIP file
Create a
.batfile (for example,delete_proxy_agent_service.bat) with the following contents:FOR /F "delims=" %%i IN ('CALL "%HVR_HOME%/bin/hvr" hvrhubserversvc -s') DO SET HvrHubServerSvcOutput=%%i REM We use a normalized HVR_CONFIG path hash to guarantee a unique service name SET HubConfigHash=%HvrHubServerSvcOutput:~13,8% %HVR_HOME%/proxy/prunsrv.exe //DS//FivetranProxy_%HubConfigHash%Run the
.batfile as an Administrator to remove all Proxy Agent service entries.
Uninstall Proxy Agent from Linux
Stop the Proxy Agent service:
sudo systemctl stop fivetran_proxy.serviceDisable the service from auto-starting at boot:
sudo systemctl disable fivetran_proxy.serviceRemove the service configuration file:
sudo rm /etc/systemd/system/fivetran_proxy.serviceReload the systemd manager configuration:
sudo systemctl daemon-reloadClear the systemd state for any failed services:
sudo systemctl reset-failed